Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 01:21

General

  • Target

    56e6b8d79a430a7897dd34778ca8c8dacf3d494439789d6bab62a4c0c6135edc.exe

  • Size

    1.3MB

  • MD5

    3998917b549a68d1f8cc8e4680cf6d31

  • SHA1

    db4abca80947a42770f0d8e5a50192f32152f1a5

  • SHA256

    56e6b8d79a430a7897dd34778ca8c8dacf3d494439789d6bab62a4c0c6135edc

  • SHA512

    d01f4ed481fe474f744c4e0af06d6233e46b27325551ce6a2de38b5feebf2f2af0cb51753570742e7fed750e62aa8edb002a4b8d8b54de9f938f00cb76b9b802

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56e6b8d79a430a7897dd34778ca8c8dacf3d494439789d6bab62a4c0c6135edc.exe
    "C:\Users\Admin\AppData\Local\Temp\56e6b8d79a430a7897dd34778ca8c8dacf3d494439789d6bab62a4c0c6135edc.exe"
    1⤵
    • Drops file in Windows directory
    PID:860

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/860-54-0x0000000076681000-0x0000000076683000-memory.dmp
    Filesize

    8KB

  • memory/860-55-0x0000000000140000-0x000000000016F000-memory.dmp
    Filesize

    188KB