Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    25-10-2021 08:12

General

  • Target

    INVO07844SCH.exe

  • Size

    123KB

  • MD5

    16de4b8e44a1b040898270c4bca96a55

  • SHA1

    8767b665350873f683d708aa406348cfaad90a05

  • SHA256

    471f26d441eb0872b6c93709284022ef3866b279dabdc601b2dfd1e876a37598

  • SHA512

    0d7eaf3839124186d7956232dd79ce83ea789a617cfccf9d78b5950ade289e000edfff46cfc0ed9773988c057ca817db360281215d83dd4f72a17dc547209aa4

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INVO07844SCH.exe
    "C:\Users\Admin\AppData\Local\Temp\INVO07844SCH.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Aspnet_compiler.exe"
      2⤵
        PID:1912

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/776-55-0x0000000000990000-0x0000000000991000-memory.dmp
      Filesize

      4KB

    • memory/776-57-0x000000001B360000-0x000000001B362000-memory.dmp
      Filesize

      8KB

    • memory/776-58-0x0000000000410000-0x0000000000420000-memory.dmp
      Filesize

      64KB