Analysis

  • max time kernel
    117s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    22-07-2021 03:38

General

  • Target

    SecuriteInfo.com.Variant.Zusy.394472.4088.27156.exe

  • Size

    227KB

  • MD5

    f6fa09a57fafac2e5cddc581361cd39b

  • SHA1

    23b4dbe6b269c05e5d383a29221ec6151b6d5b5c

  • SHA256

    21b566d7ce91cf64d9161fde5a3c1370252ac57128427181cf42ad81a8fdd241

  • SHA512

    f546239db742b9ea5cbb5b1e79dcf66f8b88ebab8f8ffc1e123da916b105ab50dadbdec832811c0dd0e05efc5033d54d73173101fb224f9aa0bf573b676966f9

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Zusy.394472.4088.27156.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Zusy.394472.4088.27156.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Zusy.394472.4088.27156.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 516
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1536-65-0x0000000000000000-mapping.dmp

  • memory/1536-67-0x0000000000520000-0x0000000000534000-memory.dmp

    Filesize

    80KB

  • memory/1660-60-0x0000000076E11000-0x0000000076E13000-memory.dmp

    Filesize

    8KB

  • memory/1660-63-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2036-61-0x00000000004374AE-mapping.dmp

  • memory/2036-64-0x0000000002030000-0x0000000002031000-memory.dmp

    Filesize

    4KB