Analysis

  • max time kernel
    149s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-05-2021 06:43

General

  • Target

    573e3ce4dcfe2a12a7e25d937ff537d6bde831a091637e27fdd86739016fc3c3.exe

  • Size

    1.1MB

  • MD5

    be658b42988db5581647601aed6ee9b3

  • SHA1

    7ae266af34b141369201fe5dc54812d6a135a310

  • SHA256

    573e3ce4dcfe2a12a7e25d937ff537d6bde831a091637e27fdd86739016fc3c3

  • SHA512

    911e9639a327537960c2e393a812543c1f0f7b42b37b083e5bcae2ec65ab29e7f5e2399cb4e46da899ae8c7627b844a765e29f519a9ff1c7c4d65dcc4c82185e

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\573e3ce4dcfe2a12a7e25d937ff537d6bde831a091637e27fdd86739016fc3c3.exe
    "C:\Users\Admin\AppData\Local\Temp\573e3ce4dcfe2a12a7e25d937ff537d6bde831a091637e27fdd86739016fc3c3.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads