Analysis

  • max time kernel
    123s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2022 00:33

General

  • Target

    5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe

  • Size

    254KB

  • MD5

    0ef4fe312fdafc87b0f785e8e69c3ecf

  • SHA1

    7ac2dc2560610f00859c83c33afab23553cb670b

  • SHA256

    5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21

  • SHA512

    2da6a733a8fc3063bf03852085fca6d279601f34cb41a07cec4999e61f5ebc9d3f75fa537027fb48c2f9cd098dc4d94636adf49be5fa3491846b3b311715312c

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe
    "C:\Users\Admin\AppData\Local\Temp\5b3af8ebaba8a69138082222953c84c56136ea4ccae550efe290b04685a67d21.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\system32\explorer.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-57-0x00000000000C3BF0-mapping.dmp

  • memory/1612-59-0x0000000074681000-0x0000000074683000-memory.dmp

    Filesize

    8KB

  • memory/1612-61-0x00000000000C0000-0x00000000000D3000-memory.dmp

    Filesize

    76KB

  • memory/1612-62-0x00000000000C0000-0x00000000000D3000-memory.dmp

    Filesize

    76KB

  • memory/1816-54-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/1816-55-0x0000000005700000-0x0000000005727000-memory.dmp

    Filesize

    156KB

  • memory/1816-56-0x0000000000400000-0x0000000000444000-memory.dmp

    Filesize

    272KB

  • memory/1816-60-0x0000000005700000-0x0000000005727000-memory.dmp

    Filesize

    156KB