Analysis

  • max time kernel
    164s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 16:18

General

  • Target

    f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe

  • Size

    59KB

  • MD5

    a224082e1b6e1c84405ff64798586bfe

  • SHA1

    2179df0219384c4b1eb158553725a6fd2d6d3ee3

  • SHA256

    f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2

  • SHA512

    43845d3a6de0195cce665efa27ddb2d869d8e9a042f3a33d1699cce670901e1ffee7073a4e37c9be07c3c5ad6e308ee7aaec5402dcbb8936bb6f1312337cdef2

  • SSDEEP

    1536:xEhhiul08b2lWB2A/SnK/ibILzbB2EEdeKrx+X6d:xEhh5JbhBv/S4LXBBkke

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe
    "C:\Users\Admin\AppData\Local\Temp\f3c4a16ea1753b30ef61a23c33b316cae904764e649c251fc091fe38f31a39c2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\RunDll32.exe
      RunDll32 "C:\Users\Admin\AppData\Local\Temp\6604.tmp",Init
      2⤵
      • Loads dropped DLL
      PID:2044
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1208
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1140

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\6604.tmp

                Filesize

                56KB

                MD5

                dd8105723c29404a405c3faa00ecdd57

                SHA1

                2545315d4607edbcc6d44fd4e3d6131ea3a54b5c

                SHA256

                44a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b

                SHA512

                9900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0

              • \Users\Admin\AppData\Local\Temp\6604.tmp

                Filesize

                56KB

                MD5

                dd8105723c29404a405c3faa00ecdd57

                SHA1

                2545315d4607edbcc6d44fd4e3d6131ea3a54b5c

                SHA256

                44a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b

                SHA512

                9900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0

              • \Users\Admin\AppData\Local\Temp\6604.tmp

                Filesize

                56KB

                MD5

                dd8105723c29404a405c3faa00ecdd57

                SHA1

                2545315d4607edbcc6d44fd4e3d6131ea3a54b5c

                SHA256

                44a620d7a537f1d061e9c33264cec9187530cbf29fca04e2765c14a6fc618e3b

                SHA512

                9900ee5d9b32d272b1aed24c760b85a511d962401cffbe1726b3b16dfa0853b05ab2aa5df9d96951f98bc979a2e71ffd1c4171b99613b5c9d2bf01be7654f1c0

              • memory/1140-58-0x0000000001C40000-0x0000000001C41000-memory.dmp

                Filesize

                4KB

              • memory/1668-55-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB

              • memory/1668-56-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB

              • memory/1668-71-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB

              • memory/2044-59-0x0000000075241000-0x0000000075243000-memory.dmp

                Filesize

                8KB

              • memory/2044-69-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB

              • memory/2044-70-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB

              • memory/2044-72-0x00000000750E0000-0x0000000075103000-memory.dmp

                Filesize

                140KB