Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2022 16:13

General

  • Target

    fbf4c44553045885e11fc070915976f0.exe

  • Size

    432KB

  • MD5

    fbf4c44553045885e11fc070915976f0

  • SHA1

    79d1f3829ab8f35e6215fd8e1f1a21abf46824d6

  • SHA256

    caa8d26ed13b2e3be28336b9804dc7ed6b7b08f9989a3b22d704bdb2758d8a97

  • SHA512

    7e61facd5d6eb4d5bb20524fc2a11190ccf6fd9d1118b9b869897fa353f6d9d4f93093ae58821ed7ef75c1e15e2141bdfc194e0311c49c4a60b8ef717e6b3c0d

  • SSDEEP

    3072:qvGyYiSDnt18S54u9lx1hZ4wOuSyK+t1RDkevgvy0A90jy:u4MburUiKkjvd0S0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbf4c44553045885e11fc070915976f0.exe
    "C:\Users\Admin\AppData\Local\Temp\fbf4c44553045885e11fc070915976f0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

    Filesize

    214.7MB

    MD5

    db72a8d552be8d5f7732d73bc6e3f0aa

    SHA1

    00be6abbecd2cc8df6cc8019fc91ec38eb38814c

    SHA256

    0fa87e9983eb34e49d178ec69790ce5116cacc9a4c89e90927ea725768950fa7

    SHA512

    2bb340c9a02af82d73075a57df69c106bcca1c677e3ae1453a19aa836aa529da74397a57b1238322c3c4c65ba6ef1f8719a05877850dc67dc606fa2cb3169d1a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

    Filesize

    214.7MB

    MD5

    db72a8d552be8d5f7732d73bc6e3f0aa

    SHA1

    00be6abbecd2cc8df6cc8019fc91ec38eb38814c

    SHA256

    0fa87e9983eb34e49d178ec69790ce5116cacc9a4c89e90927ea725768950fa7

    SHA512

    2bb340c9a02af82d73075a57df69c106bcca1c677e3ae1453a19aa836aa529da74397a57b1238322c3c4c65ba6ef1f8719a05877850dc67dc606fa2cb3169d1a

  • memory/288-54-0x0000000000000000-mapping.dmp

  • memory/288-57-0x0000000001280000-0x00000000012A6000-memory.dmp

    Filesize

    152KB

  • memory/288-58-0x0000000075771000-0x0000000075773000-memory.dmp

    Filesize

    8KB