Analysis

  • max time kernel
    145s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2022, 07:14

General

  • Target

    701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe

  • Size

    167KB

  • MD5

    66fdee022da605b25157e433317c28a0

  • SHA1

    6943b8593b38e133c3cad0ba3cc76597316daf34

  • SHA256

    701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f

  • SHA512

    b1bc5167106370c17e3b5f6691223186f789ad2a344377599b8b5e5cb1d487c76f4f4cfcf238fda47b5e898f089b22ddf69bbcd731ed96f71807e56d379745c7

  • SSDEEP

    3072:zaQVG4urzuVGp8rojCJ37NkWWslb5r8P+0kizv6ODHt/OE9sPK:OoezrKMU7WslyPlxPDHt/OED

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe
    "C:\Users\Admin\AppData\Local\Temp\701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:948
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev6B61.tmp!C:\Users\Admin\AppData\Local\Temp\701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\701C7F127D7A3B1FDF5F86B43984A5A01D9B800E035A81F51F491DE30D331E2F.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\701C7F127D7A3B1FDF5F86B43984A5A01D9B800E035A81F51F491DE30D331E2F.EXE

    Filesize

    83KB

    MD5

    f3bbbb20275c5225821f2e01efa0a539

    SHA1

    fb72080666964aa8b288f5885fc3e4989c15c11d

    SHA256

    d84a1b31ed6d0905f1d4a30eebda0a226f254ec1000f00cea4aea304ffff8209

    SHA512

    3ccbcdb975fb219cc20752ca053335c0fe1576a9be04c17b42bfe15ba0ae7bd78d3feb5195cdfa35f85d6881489c38a43660ac72282a9f2c0d2ed5fb07ec0743

  • C:\Users\Admin\AppData\Local\Temp\701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe

    Filesize

    83KB

    MD5

    f3bbbb20275c5225821f2e01efa0a539

    SHA1

    fb72080666964aa8b288f5885fc3e4989c15c11d

    SHA256

    d84a1b31ed6d0905f1d4a30eebda0a226f254ec1000f00cea4aea304ffff8209

    SHA512

    3ccbcdb975fb219cc20752ca053335c0fe1576a9be04c17b42bfe15ba0ae7bd78d3feb5195cdfa35f85d6881489c38a43660ac72282a9f2c0d2ed5fb07ec0743

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    84KB

    MD5

    9aac113a417f53e966e8445a5a24ecc5

    SHA1

    37bfa9aa6dc1275c0d1a40383404b16c74603039

    SHA256

    df8ddf723b330e82f795d7f5588c1ad0cd2c80759c14806d2813f25cf7b71374

    SHA512

    322cb3f1eb39d4ecf65fd583f409e9c1ffaf06579c8988b11087d0abfc9d32dc1e855ef936a4f95f6efc3e770df08d18794f172245c76ef954e59e46f5b64b9f

  • C:\Windows\MSWDM.EXE

    Filesize

    84KB

    MD5

    9aac113a417f53e966e8445a5a24ecc5

    SHA1

    37bfa9aa6dc1275c0d1a40383404b16c74603039

    SHA256

    df8ddf723b330e82f795d7f5588c1ad0cd2c80759c14806d2813f25cf7b71374

    SHA512

    322cb3f1eb39d4ecf65fd583f409e9c1ffaf06579c8988b11087d0abfc9d32dc1e855ef936a4f95f6efc3e770df08d18794f172245c76ef954e59e46f5b64b9f

  • C:\Windows\MSWDM.EXE

    Filesize

    84KB

    MD5

    9aac113a417f53e966e8445a5a24ecc5

    SHA1

    37bfa9aa6dc1275c0d1a40383404b16c74603039

    SHA256

    df8ddf723b330e82f795d7f5588c1ad0cd2c80759c14806d2813f25cf7b71374

    SHA512

    322cb3f1eb39d4ecf65fd583f409e9c1ffaf06579c8988b11087d0abfc9d32dc1e855ef936a4f95f6efc3e770df08d18794f172245c76ef954e59e46f5b64b9f

  • C:\Windows\dev6B61.tmp

    Filesize

    83KB

    MD5

    f3bbbb20275c5225821f2e01efa0a539

    SHA1

    fb72080666964aa8b288f5885fc3e4989c15c11d

    SHA256

    d84a1b31ed6d0905f1d4a30eebda0a226f254ec1000f00cea4aea304ffff8209

    SHA512

    3ccbcdb975fb219cc20752ca053335c0fe1576a9be04c17b42bfe15ba0ae7bd78d3feb5195cdfa35f85d6881489c38a43660ac72282a9f2c0d2ed5fb07ec0743

  • \Users\Admin\AppData\Local\Temp\701c7f127d7a3b1fdf5f86b43984a5a01d9b800e035a81f51f491de30d331e2f.exe

    Filesize

    83KB

    MD5

    f3bbbb20275c5225821f2e01efa0a539

    SHA1

    fb72080666964aa8b288f5885fc3e4989c15c11d

    SHA256

    d84a1b31ed6d0905f1d4a30eebda0a226f254ec1000f00cea4aea304ffff8209

    SHA512

    3ccbcdb975fb219cc20752ca053335c0fe1576a9be04c17b42bfe15ba0ae7bd78d3feb5195cdfa35f85d6881489c38a43660ac72282a9f2c0d2ed5fb07ec0743

  • memory/816-67-0x0000000075141000-0x0000000075143000-memory.dmp

    Filesize

    8KB

  • memory/948-65-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/948-69-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1436-66-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1756-59-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1756-54-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB