Analysis

  • max time kernel
    134s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-10-2022 18:09

General

  • Target

    file.exe

  • Size

    457KB

  • MD5

    9ecafa0a55d800f4293093989b90d595

  • SHA1

    4b7388775266bf7b9edd19ff456f9dcc5a6bcd06

  • SHA256

    914be79c80638787a90cb4d7598ad60a8f39634cb4858489bde36c0e32e235aa

  • SHA512

    d43417b47641d815b99687c3418abb0fad2963f7466eac304d596ac61099f09ba1db3fce3a2b7e15a71f29e27476ef579b9e9200778d277acc470c26bc602b49

  • SSDEEP

    3072:8ahKyd2n31If5HxTQ3fXaPm1cF8o4Y1Z8JP:8ahOOfTQvXaPm1cFrV4J

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ANSWER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ANSWER~1.EXE
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1932

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ANSWER~1.EXE
    Filesize

    214.6MB

    MD5

    bb8689d9b974d82e1d538277a9e46ea3

    SHA1

    f2b6671113b9f855574369ead9dbbeb6acfdfefe

    SHA256

    4af7c294e7310214795adee79cf35eb1865ef3219f9b35335d19534941c8783d

    SHA512

    d2164c4e798d5cae0fcb2c7d589b12458a011d0ee26fdbb9e3d9995a5c1eba81a41914f06cb800fc00ed6a4befed89b14e7414ee974a6f22919b8ce58edf0304

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ANSWER~1.EXE
    Filesize

    214.6MB

    MD5

    bb8689d9b974d82e1d538277a9e46ea3

    SHA1

    f2b6671113b9f855574369ead9dbbeb6acfdfefe

    SHA256

    4af7c294e7310214795adee79cf35eb1865ef3219f9b35335d19534941c8783d

    SHA512

    d2164c4e798d5cae0fcb2c7d589b12458a011d0ee26fdbb9e3d9995a5c1eba81a41914f06cb800fc00ed6a4befed89b14e7414ee974a6f22919b8ce58edf0304

  • memory/1932-54-0x0000000000000000-mapping.dmp
  • memory/1932-57-0x0000000000E30000-0x0000000000E42000-memory.dmp
    Filesize

    72KB

  • memory/1932-58-0x0000000075F51000-0x0000000075F53000-memory.dmp
    Filesize

    8KB