Analysis

  • max time kernel
    147s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 14:59

General

  • Target

    a80860c03f99d91f400b6054fcfe2b949c83eb4acaccc4885bea83532c981e9d.exe

  • Size

    600KB

  • MD5

    6edb8bee87457c4c26b63ef9ea77f7c0

  • SHA1

    7b6377cf3749e41277cd994a54ef6bdfe3cbd5c6

  • SHA256

    a80860c03f99d91f400b6054fcfe2b949c83eb4acaccc4885bea83532c981e9d

  • SHA512

    f0401dedb0660fc5f65c5dcf30f90229cddf7d86ab106b6b7ee3014774579ffab3cad9bcae10fc48f61710a53c6fca63a24211b27197640adf0e27876e239853

  • SSDEEP

    12288:NtKe6Zv23YdL/WUv0cSGx8Qv/6h/45cdMhcj8U2sewNuXNNoCyLnD/6qVS:d6Zv24/Wg0c7xm4C443LbuXNG/7dS

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a80860c03f99d91f400b6054fcfe2b949c83eb4acaccc4885bea83532c981e9d.exe
    "C:\Users\Admin\AppData\Local\Temp\a80860c03f99d91f400b6054fcfe2b949c83eb4acaccc4885bea83532c981e9d.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    603KB

    MD5

    df23b1fee0991361b52992eeb34655ca

    SHA1

    cb34f6cc246debf8a20e86dec6bf95926fb31252

    SHA256

    ae32c5f165dc45efd83fdc12e20a1828f463f260d9c7654762c09cd6d1cba369

    SHA512

    4d866bf96d18aefd7c80c099c138cf37f54c331f828fae2069e07c606c4a83b9f08f5892fd476f6491a43a33d082408fa40ad7229b1233d6d7528c84882194a3

  • memory/756-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/756-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1152-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1152-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB