Analysis

  • max time kernel
    51s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 02:44

General

  • Target

    335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04.exe

  • Size

    229KB

  • MD5

    8e20b32cc0daf478a81c9b4bfabb82d8

  • SHA1

    fc6c797aa54bf8e010fad84568c7e74e12903274

  • SHA256

    335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04

  • SHA512

    73de0a3695167ade1a093210567d0ae140e2082caff2eab1034d2591414b9dabc6921218a4b7173b67a4bd6debb28b86c95472c7142d69caa0d293150a13b08b

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04.exe
    "C:\Users\Admin\AppData\Local\Temp\335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04.exe
      "C:\Users\Admin\AppData\Local\Temp\335a973cd3d245457d78423d13aaf020bb4fab14de2c2381f07ae28c50e0cc04.exe"
      2⤵
        PID:2024

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1672-54-0x00000000763C1000-0x00000000763C3000-memory.dmp
      Filesize

      8KB

    • memory/1672-55-0x0000000074860000-0x0000000074E0B000-memory.dmp
      Filesize

      5.7MB

    • memory/1672-67-0x0000000074860000-0x0000000074E0B000-memory.dmp
      Filesize

      5.7MB

    • memory/2024-57-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-59-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-61-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-63-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-64-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-65-0x000000000119552E-mapping.dmp
    • memory/2024-56-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-66-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-68-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-70-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB

    • memory/2024-71-0x0000000000400000-0x0000000000416000-memory.dmp
      Filesize

      88KB