Analysis

  • max time kernel
    152s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2022 04:54

General

  • Target

    5ced46014177ba31c4539a8558a33d6e1822f976dfcdacedcddc2d2c1460b595.exe

  • Size

    52KB

  • MD5

    2b4694b50579f51a39c330d761fc3dd9

  • SHA1

    ceeaaff66901da6ebb6da94f680f71fa583cd1c2

  • SHA256

    5ced46014177ba31c4539a8558a33d6e1822f976dfcdacedcddc2d2c1460b595

  • SHA512

    45fcce83e27840ade8797cfd477ec9da841b7149217c3ea4589d0c93d69eeb520277f46f2a34f3529804075e3e70676cd500c65583db96c61fc507514a995cc7

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ced46014177ba31c4539a8558a33d6e1822f976dfcdacedcddc2d2c1460b595.exe
    "C:\Users\Admin\AppData\Local\Temp\5ced46014177ba31c4539a8558a33d6e1822f976dfcdacedcddc2d2c1460b595.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:956
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-54-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/956-55-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/956-56-0x0000000076031000-0x0000000076033000-memory.dmp

    Filesize

    8KB

  • memory/956-57-0x0000000001B50000-0x0000000001B82000-memory.dmp

    Filesize

    200KB

  • memory/956-58-0x0000000001B50000-0x0000000001B82000-memory.dmp

    Filesize

    200KB

  • memory/1268-60-0x0000000077610000-0x00000000777B9000-memory.dmp

    Filesize

    1.7MB

  • memory/1268-61-0x0000000002640000-0x0000000002648000-memory.dmp

    Filesize

    32KB

  • memory/1268-62-0x0000000077610000-0x00000000777B9000-memory.dmp

    Filesize

    1.7MB