Analysis

  • max time kernel
    150s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    16-05-2021 02:16

General

  • Target

    122cd303b358e49f5b945e54da84d57c9df9cd2255ac604e5e8fa69c76278de1.exe

  • Size

    1.9MB

  • MD5

    003acf196868feddf108ab0b2685db2c

  • SHA1

    20cd7e17d7a02de5ff4ccbae1267bfb831ccdbb3

  • SHA256

    122cd303b358e49f5b945e54da84d57c9df9cd2255ac604e5e8fa69c76278de1

  • SHA512

    180986d74acda3ed043e7955f3e19102f9145cacc52783ed20aa642076f19bed5e7f3cb7b2910ee954555a7474d321e79cfc7df6e6e97cf9072d524717201ba1

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\122cd303b358e49f5b945e54da84d57c9df9cd2255ac604e5e8fa69c76278de1.exe
    "C:\Users\Admin\AppData\Local\Temp\122cd303b358e49f5b945e54da84d57c9df9cd2255ac604e5e8fa69c76278de1.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/520-59-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB