Analysis

  • max time kernel
    4294182s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    20-03-2022 09:58

General

  • Target

    Adjunto orden de compra.exe

  • Size

    1.1MB

  • MD5

    20f7d95a5ff1ad22ebabc1037556c014

  • SHA1

    25c25c70ba0e88f4952fb739df0e9d48896b71fd

  • SHA256

    1b931e14bdbf51c88c98a13c7f934dd3c9e8e1b8583d8d95129e1a0b3a03eece

  • SHA512

    11f5431d648eccbd3234a4b325a4ce9adea021c28ed144bc1f8e55d47ce99ef9910266b7d6c7cfdb9eb5ede7512e25ae4ee8a09a9ae7b3e653c2c04b205b153f

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adjunto orden de compra.exe
    "C:\Users\Admin\AppData\Local\Temp\Adjunto orden de compra.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\SysWOW64\logagent.exe
      C:\Windows\System32\logagent.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 140
        3⤵
        • Program crash
        PID:1976

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1476-59-0x0000000072480000-0x00000000724AE000-memory.dmp
    Filesize

    184KB

  • memory/1476-61-0x0000000000080000-0x0000000000081000-memory.dmp
    Filesize

    4KB

  • memory/1804-54-0x00000000759C1000-0x00000000759C3000-memory.dmp
    Filesize

    8KB

  • memory/1804-55-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB

  • memory/1804-58-0x00000000045E6000-0x00000000045E7000-memory.dmp
    Filesize

    4KB