Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 22:11

General

  • Target

    56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6.exe

  • Size

    539KB

  • MD5

    6319deba9e4020c41f0d95845dd79ae1

  • SHA1

    00ae8460e1fd0d24a62125cb933088c88a0346df

  • SHA256

    56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6

  • SHA512

    604a73d01a2ba7c12094ed817c756fdbe991b831a211b43442d2bf786286003ccfec3d0939b4db575a43a469deeb4ba3f45de7221ea742159aec029f6226374f

  • SSDEEP

    12288:018PltD6Prl9zG2oxgXhEL13eA7nmY3ehn:018PltGPre2GguLtriYq

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6.exe
        "C:\Users\Admin\AppData\Local\Temp\56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1672
        • C:\Users\Admin\AppData\Local\Temp\56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6.exe
          "C:\Users\Admin\AppData\Local\Temp\56f06b653149f78caadd3d392587222e880447ebce5eea3946b27585570c27b6.exe"
          3⤵
            PID:1580

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1260-58-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/1580-55-0x0000000000000000-mapping.dmp

      • memory/1580-57-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1672-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

        Filesize

        8KB

      • memory/1672-60-0x0000000000400000-0x000000000048A000-memory.dmp

        Filesize

        552KB

      • memory/1672-61-0x00000000002E0000-0x000000000036A000-memory.dmp

        Filesize

        552KB