Analysis

  • max time kernel
    68s
  • max time network
    72s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2022 06:44

General

  • Target

    client-win2k-i386_key-20220921-143520-00000000_20221014-202828-00000000.exe

  • Size

    2.0MB

  • MD5

    0fab790a8c17f3814203a1811e61a350

  • SHA1

    77b1f53fbb8566c38bd448042ebb5055165cc626

  • SHA256

    561ea3d3c3fee5002d29f24c383917c007a26ea2dcc2a09093d349ba8e209997

  • SHA512

    534811c47a32e31731002047faff651a9a4608d7f6e430b8d1e030b75ae10f942b7861fcbd1f05f33b53b2e64137947442a4fa3928b8a52f5a83e5d8b35d8271

  • SSDEEP

    24576:MB0slVqXmxJNJ2f1zIhO6V/WzO4kiVvUhjr9cNphx1yeBcbhPf/3bzaeTP0JdbiT:z7VvUhjr9cNNEe8f/rue0J4T

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\client-win2k-i386_key-20220921-143520-00000000_20221014-202828-00000000.exe
    "C:\Users\Admin\AppData\Local\Temp\client-win2k-i386_key-20220921-143520-00000000_20221014-202828-00000000.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Local\Temp\Fu537A5.tmp
      1 1388 C:\Users\Admin\AppData\Local\Temp\client-win2k-i386_key-20220921-143520-00000000_20221014-202828-00000000.exe
      2⤵
      • Executes dropped EXE
      PID:1476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Fu537A5.tmp

    Filesize

    73KB

    MD5

    56a03424e0d92573235327a4cc5e88fd

    SHA1

    87c57e0fab727638003aba56eda062e3de606762

    SHA256

    f3c1a2949ecae4c2d27b70e6526f5d016ced372e4ce376a26fd462c815f45cd4

    SHA512

    edebe2a4557a6d04cef23bf1497e6a982446fdf94bf0ebb04ab77ed4821e101bcd6137e19c825f076aa8fb9faa04ddcea695296afcb07ea1991bcddcba647234

  • memory/1388-54-0x00000000768A1000-0x00000000768A3000-memory.dmp

    Filesize

    8KB

  • memory/1476-55-0x0000000000000000-mapping.dmp