Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    02-12-2021 08:53

General

  • Target

    PO 35467833(VN).exe

  • Size

    550KB

  • MD5

    bdb527c345da49a51e27f2a69c7b7e05

  • SHA1

    fce0a4025c531428178aa6bbc4a7009529703988

  • SHA256

    4823a9ac448317ca5972eb094f2eec9f1f3b2fda812c0d637e12e2b9240feefd

  • SHA512

    7c6a3f06781afe1af816ad72a99fa8e8a904b70d6373ca9828546768cad636212bce248213326c8f7eb0fddf1ee41a44b8fe57563b49696411ea698f8b62ecc6

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO 35467833(VN).exe
    "C:\Users\Admin\AppData\Local\Temp\PO 35467833(VN).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 664
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1092-55-0x0000000001360000-0x0000000001361000-memory.dmp
    Filesize

    4KB

  • memory/1092-57-0x0000000074F61000-0x0000000074F63000-memory.dmp
    Filesize

    8KB

  • memory/1092-58-0x0000000004F30000-0x0000000004F31000-memory.dmp
    Filesize

    4KB

  • memory/1092-59-0x0000000000450000-0x0000000000458000-memory.dmp
    Filesize

    32KB

  • memory/1092-60-0x0000000005070000-0x00000000050E5000-memory.dmp
    Filesize

    468KB

  • memory/1200-61-0x0000000000000000-mapping.dmp
  • memory/1200-62-0x00000000005A0000-0x00000000005A1000-memory.dmp
    Filesize

    4KB