Analysis

  • max time kernel
    153s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 05:15

General

  • Target

    c0c3ef8bee653f8880f6a4180561b27983d4e19e0bd2d83edb76243bce21f96b.exe

  • Size

    83KB

  • MD5

    13c4083bdb893c8a0bd2930fa55962ca

  • SHA1

    c908cc99bfe3c1a039dacbe43866625ace75d342

  • SHA256

    c0c3ef8bee653f8880f6a4180561b27983d4e19e0bd2d83edb76243bce21f96b

  • SHA512

    fc1e855dc63c5934d2d7fcb7d2291bbd6795899bfe288932643c3732c514c8df0508a3ba918f124f72207835afd85c14840a2aacbafc99f049cc53a77f6855cc

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0c3ef8bee653f8880f6a4180561b27983d4e19e0bd2d83edb76243bce21f96b.exe
    "C:\Users\Admin\AppData\Local\Temp\c0c3ef8bee653f8880f6a4180561b27983d4e19e0bd2d83edb76243bce21f96b.exe"
    1⤵
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/808-54-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/808-56-0x0000000000380000-0x000000000038B000-memory.dmp

    Filesize

    44KB

  • memory/808-57-0x00000000003F0000-0x00000000003FA000-memory.dmp

    Filesize

    40KB