Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 17:05

General

  • Target

    001-Payment Copy_jpg.exe

  • Size

    138KB

  • MD5

    e38c39929d384898ca31dce2025a5a5d

  • SHA1

    d6cbaa65c555d812c8bb4fbd6b3cd96194c19e9d

  • SHA256

    071c2735b8c6d74c6a792f526a51c9cf33b736af9d5cb392ae36ed2d636b777c

  • SHA512

    bbc9accf729faf4553568b45414fc7d6f0939d57effa6b2b310a20c64bf1ea884090bfeeccc2fb851e50c83b82fa23bf2ff92422ed675575ad6d475742df26cf

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\001-Payment Copy_jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\001-Payment Copy_jpg.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe"
      2⤵
        PID:1468

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-55-0x00000000009D0000-0x00000000009D1000-memory.dmp
      Filesize

      4KB

    • memory/1712-57-0x00000000003C0000-0x00000000003C2000-memory.dmp
      Filesize

      8KB

    • memory/1712-58-0x000000001A9F0000-0x000000001A9F2000-memory.dmp
      Filesize

      8KB

    • memory/1712-59-0x0000000001F00000-0x0000000001F08000-memory.dmp
      Filesize

      32KB

    • memory/1712-60-0x0000000001F10000-0x0000000001F12000-memory.dmp
      Filesize

      8KB