Analysis

  • max time kernel
    150s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    15-05-2021 08:02

General

  • Target

    aeca6bcf2db969cb99ee3819cba054507effe800e24c8db41bb5a29a24a89102.exe

  • Size

    1.4MB

  • MD5

    90b03eb797256517546b9cbbe3113f9c

  • SHA1

    f7028ca655cd4507bd37988c8ed4083af7310ef1

  • SHA256

    aeca6bcf2db969cb99ee3819cba054507effe800e24c8db41bb5a29a24a89102

  • SHA512

    5591d2a9dcbdbf69c0fb794bca2c89f30100f0c91a858f140c97f8a2b566a06b3bd8c8c5189926c9eb637822d2778dd468d7f5b4d571238be2fdeaeca827c85f

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aeca6bcf2db969cb99ee3819cba054507effe800e24c8db41bb5a29a24a89102.exe
    "C:\Users\Admin\AppData\Local\Temp\aeca6bcf2db969cb99ee3819cba054507effe800e24c8db41bb5a29a24a89102.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1892

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-59-0x0000000000400000-0x0000000000434000-memory.dmp
    Filesize

    208KB