Analysis

  • max time kernel
    14s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    03/08/2021, 12:06

General

  • Target

    da484abefb23789c13add9ecd7ea7eeb.exe

  • Size

    693KB

  • MD5

    da484abefb23789c13add9ecd7ea7eeb

  • SHA1

    cf0098c51761c3c9b860cdfd290734f0d1657bba

  • SHA256

    223dfd54929007ac23d6a20dbcf81a519a14f1c4061d23afcb761b75796042d2

  • SHA512

    380d3227555739a95ae2514fbe1f24882cbf91db508339837aee2fc6d1ac1c5a7feabcef9bf87ebc8b4efe6fa1f142f2ad9efd595899875fd1e416aa1965d368

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe
      "C:\Users\Admin\AppData\Local\Temp\da484abefb23789c13add9ecd7ea7eeb.exe"
      2⤵
        PID:1348

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2016-114-0x0000000000130000-0x0000000000131000-memory.dmp

            Filesize

            4KB

          • memory/2016-116-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

            Filesize

            4KB

          • memory/2016-117-0x0000000004A80000-0x0000000004A81000-memory.dmp

            Filesize

            4KB

          • memory/2016-118-0x0000000004A20000-0x0000000004A21000-memory.dmp

            Filesize

            4KB

          • memory/2016-119-0x00000000049E0000-0x0000000004EDE000-memory.dmp

            Filesize

            5.0MB

          • memory/2016-120-0x00000000049E0000-0x0000000004EDE000-memory.dmp

            Filesize

            5.0MB

          • memory/2016-121-0x00000000049E0000-0x0000000004EDE000-memory.dmp

            Filesize

            5.0MB

          • memory/2016-122-0x00000000049E0000-0x0000000004EDE000-memory.dmp

            Filesize

            5.0MB

          • memory/2016-123-0x0000000007A20000-0x0000000007A21000-memory.dmp

            Filesize

            4KB

          • memory/2016-124-0x0000000007AC0000-0x0000000007B3E000-memory.dmp

            Filesize

            504KB