Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 17:10

General

  • Target

    dad9f3bb6d49dc11e871b51422182d79c1e35c58d50bba00912dc3079274d3ca.exe

  • Size

    32KB

  • MD5

    56be4cc53c1c3da793bc2bc4a7915f0b

  • SHA1

    ff73a0f1da31d4b446fea26f6302cb088880e2ba

  • SHA256

    dad9f3bb6d49dc11e871b51422182d79c1e35c58d50bba00912dc3079274d3ca

  • SHA512

    83eb8894b137f1ddfa0184818224d04b268de8f4e623a16b1a939ec9ddfe4f648ab845a29f796c7e17cdce2129a942b0d71133ddc2d57c7c8bc465e267d2655b

  • SSDEEP

    384:f98xUHQvHsw2fvoy4/q8zLeiaerhPVozyTWmGs6ef+nCFa/p1Uq4g:WwmsZvoBqop/yAWmF6FnKg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dad9f3bb6d49dc11e871b51422182d79c1e35c58d50bba00912dc3079274d3ca.exe
    "C:\Users\Admin\AppData\Local\Temp\dad9f3bb6d49dc11e871b51422182d79c1e35c58d50bba00912dc3079274d3ca.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:908
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:964

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~dfds3.reg

      Filesize

      172B

      MD5

      5ec4f209ac896a4f30916a5a39e942c1

      SHA1

      25c3ff3af238e0a5cfe0408ae5023018a6232ae9

      SHA256

      d620bb95c4862e504256ab11b91e0f06d409039270b9f0b0fc639571fcb43cf7

      SHA512

      539e6b7745eda5fb2940b84116b287e32d2e8c3bdcab221a726ccc81ad56d1941bd74a6ce03ffa492b3b4b688d8822a986a66c682753d054e3ad458c825e7e01

    • memory/908-55-0x0000000000000000-mapping.dmp

    • memory/964-60-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/964-63-0x000000000040246F-mapping.dmp

    • memory/964-62-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/1528-54-0x0000000075021000-0x0000000075023000-memory.dmp

      Filesize

      8KB

    • memory/1528-58-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/1528-59-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/1528-64-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB