Analysis

  • max time kernel
    148s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 15:52

General

  • Target

    671546b7c3ce854a692ba68b12126d6e33462434d923f043106f86d8ee1c8110.exe

  • Size

    206KB

  • MD5

    6195587506c8f15edd5ea1a6770c5cd0

  • SHA1

    e15eb1b627198ba165d40454ed259b07e48a1b0b

  • SHA256

    671546b7c3ce854a692ba68b12126d6e33462434d923f043106f86d8ee1c8110

  • SHA512

    cef66c730cf36500ad78b80a705c8445eacc731b454e29c7f90d3a85b8f41ccbe8629fc545bed37b7589fcb4f1529c8e38bbb4b289a48c7a210bdb1eb22cf271

  • SSDEEP

    3072:MRAhhcsxgAJuK7bZD01GoI0ONtNmlngmx5MODNzKQTtUIdtkf5vPrDYPemlg1y2q:MRAhhJxX7bNIFlJRUI8BPolCy2AS+Yq

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\671546b7c3ce854a692ba68b12126d6e33462434d923f043106f86d8ee1c8110.exe
    "C:\Users\Admin\AppData\Local\Temp\671546b7c3ce854a692ba68b12126d6e33462434d923f043106f86d8ee1c8110.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1428

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\svchost.exe

          Filesize

          209KB

          MD5

          8663a2229c7f93c1d411a4404016bc34

          SHA1

          688eb7ca4f60a1a8a902115165afb3f9e78e249f

          SHA256

          e70a2be5795423d76d0264895089ff448c511dd9752fc70ac8893236588bd698

          SHA512

          dd48d37d558435750ee26a1c3c08ea6d75f4e8b8bd7c6db88ad16c157c89303136f10e18aa7041e6d5e9646aaaeae9fa8e3b3e2057c8628a57bac322d9709de5

        • memory/1428-58-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1428-59-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1752-54-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1752-57-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB