Analysis

  • max time kernel
    123s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    05-12-2021 01:02

General

  • Target

    ?? ?? ?????????doc.com.exe

  • Size

    848KB

  • MD5

    06559a48b54cc741ec37f24c437cd199

  • SHA1

    daa15a2ed47960179c9611ba84520bc5f8002873

  • SHA256

    2b7062e20c674dd25059533ecfbb5a66ab3ecda2e01c30e8c9a81cc4290b8f11

  • SHA512

    8d8325f6e9b29201861a28eaf6fe26f3013bf2b64be514e1b5dc329c986a41abe7a4fc5210e7c5b5e8f0dffc0521bd1d005b7260ec6ed699bb407b66d6ae66df

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\__ __ _________doc.com.exe
    "C:\Users\Admin\AppData\Local\Temp\__ __ _________doc.com.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2272

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads