Analysis

  • max time kernel
    112s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    16-06-2021 13:04

General

  • Target

    3072193fbb271c8400b427bfd22ac936.exe

  • Size

    214KB

  • MD5

    3072193fbb271c8400b427bfd22ac936

  • SHA1

    be521f536e9766c6faf840315c9bedab8501b023

  • SHA256

    d696d93b0b75d1fcd1c14fddc65cbbd7fb96bf706a04a608174d9828b1e344da

  • SHA512

    0e704c1fbb4b55d8d78edaa4b051d6188c27f6d1b44ebc14b755ea86e7f53b80bdba931926aa14e5419794475d017c0d36318c81ea52ace6220eca210cd8b877

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3072193fbb271c8400b427bfd22ac936.exe
    "C:\Users\Admin\AppData\Local\Temp\3072193fbb271c8400b427bfd22ac936.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 516
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      PID:332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/332-61-0x0000000000000000-mapping.dmp

  • memory/332-63-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/604-59-0x0000000075211000-0x0000000075213000-memory.dmp

    Filesize

    8KB

  • memory/604-60-0x0000000001F10000-0x0000000001F11000-memory.dmp

    Filesize

    4KB