Analysis

  • max time kernel
    33s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-05-2022 05:11

General

  • Target

    6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe

  • Size

    1.6MB

  • MD5

    d644eb3560601aa504917b281306a350

  • SHA1

    b43554ea4fa8eed7a9d36e4172546487b627a45d

  • SHA256

    6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8

  • SHA512

    c9a2100bd23d583d63c5fd37251b81407036f422d5cdcf2386419d78eaf25fbf2fa7bc6d34ef33f2b427ead5004ce92da9184a70d5c202d2dcb12571b403fc46

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
    "C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "mkdir %userprofile%\SystemApps"
      2⤵
        PID:932
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "copy C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe %userprofile%\SystemApps\AppSrv.exe"
        2⤵
          PID:856
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "attrib +H %userprofile%\SystemApps"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1548
          • C:\Windows\SysWOW64\attrib.exe
            attrib +H C:\Users\Admin\SystemApps
            3⤵
            • Views/modifies file attributes
            PID:604
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D %userprofile%\SystemApps\AppSrv.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1152
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D C:\Users\Admin\SystemApps\AppSrv.exe
            3⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:1108

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Hidden Files and Directories

      1
      T1158

      Defense Evasion

      Modify Registry

      2
      T1112

      Hidden Files and Directories

      1
      T1158

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/604-57-0x0000000000000000-mapping.dmp
      • memory/856-55-0x0000000000000000-mapping.dmp
      • memory/932-54-0x0000000000000000-mapping.dmp
      • memory/1108-59-0x0000000000000000-mapping.dmp
      • memory/1152-58-0x0000000000000000-mapping.dmp
      • memory/1548-56-0x0000000000000000-mapping.dmp