Analysis

  • max time kernel
    151s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 16:18

General

  • Target

    fa201757612727359dc63e4e146548deb9c16518ed4f426b3842ee3ce95dc484.exe

  • Size

    63KB

  • MD5

    a19364ad5be3be8c64e4e0706be25c4d

  • SHA1

    56d72a21a688d98c115fbc04b9280eb3451c7a0d

  • SHA256

    fa201757612727359dc63e4e146548deb9c16518ed4f426b3842ee3ce95dc484

  • SHA512

    42a0224e82e3b02a5b4d36dc55d848e8f94855fd01dfbbccf19cd191dc4288436415caa594e96f09ae0ee4a15f2f0a48e0644f9c1d51419a26e8e8be7b7b6b46

  • SSDEEP

    1536:xkYz22fdLuFjnM/smBN6Ub9bAN02rf7OS6PFgyFMkjhPHjdUh7:xRKEQMBBkURJUQuWNH5e7

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa201757612727359dc63e4e146548deb9c16518ed4f426b3842ee3ce95dc484.exe
    "C:\Users\Admin\AppData\Local\Temp\fa201757612727359dc63e4e146548deb9c16518ed4f426b3842ee3ce95dc484.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\RunDll32.exe
      RunDll32 "C:\Users\Admin\AppData\Local\Temp\8170.tmp",Init
      2⤵
      • Loads dropped DLL
      PID:1524
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1164
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1120

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\8170.tmp

          Filesize

          60KB

          MD5

          fd2c58ce5c438527eb06323963281a51

          SHA1

          c9d3e419c845cf7889b6cf847e389ce45dc9243d

          SHA256

          0f159afe42cd7c2ae759bbcdaea74c78c9ce96eb198e581619880000b23d16c4

          SHA512

          d4bc4e0298120f78bde64149f9990398f95b5f7d9bf2fd5d8067364e4df76bb261374cf0d55abff3957bf4b2a292616a26fc2dbef654582c025ad3ca83433d12

        • \Users\Admin\AppData\Local\Temp\8170.tmp

          Filesize

          60KB

          MD5

          fd2c58ce5c438527eb06323963281a51

          SHA1

          c9d3e419c845cf7889b6cf847e389ce45dc9243d

          SHA256

          0f159afe42cd7c2ae759bbcdaea74c78c9ce96eb198e581619880000b23d16c4

          SHA512

          d4bc4e0298120f78bde64149f9990398f95b5f7d9bf2fd5d8067364e4df76bb261374cf0d55abff3957bf4b2a292616a26fc2dbef654582c025ad3ca83433d12

        • \Users\Admin\AppData\Local\Temp\8170.tmp

          Filesize

          60KB

          MD5

          fd2c58ce5c438527eb06323963281a51

          SHA1

          c9d3e419c845cf7889b6cf847e389ce45dc9243d

          SHA256

          0f159afe42cd7c2ae759bbcdaea74c78c9ce96eb198e581619880000b23d16c4

          SHA512

          d4bc4e0298120f78bde64149f9990398f95b5f7d9bf2fd5d8067364e4df76bb261374cf0d55abff3957bf4b2a292616a26fc2dbef654582c025ad3ca83433d12

        • memory/1120-59-0x0000000001B40000-0x0000000001B41000-memory.dmp

          Filesize

          4KB

        • memory/1524-58-0x00000000762F1000-0x00000000762F3000-memory.dmp

          Filesize

          8KB

        • memory/1524-67-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB

        • memory/1524-70-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB

        • memory/1524-72-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB

        • memory/2040-55-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB

        • memory/2040-56-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB

        • memory/2040-71-0x00000000756A0000-0x00000000756C3000-memory.dmp

          Filesize

          140KB