Analysis

  • max time kernel
    200s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:40

General

  • Target

    f6903bdc8e406d0f679658726de4f6ef1d918046f429ecba7dcb1c0309294355.exe

  • Size

    425KB

  • MD5

    964d9d9150e539dff6dc1c673d373b94

  • SHA1

    b35d3b9ae6827cd87d41cce86ff592c269606da4

  • SHA256

    f6903bdc8e406d0f679658726de4f6ef1d918046f429ecba7dcb1c0309294355

  • SHA512

    fdae54c8f71e77feab29d9e79ec32c245ab8d46625c7642df782d372d06d9b724849c2ce2a518adaae7f58b9bcd2f7cd77aeb2be3780eb9de322b85152583c45

  • SSDEEP

    12288:NtKe6Zv23Yd1mIRjZp9IyTFCMXSWEOIQVufUob21fi//23r:d6Zv2VIPp9IyTFC00OZufUob2hiX2b

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6903bdc8e406d0f679658726de4f6ef1d918046f429ecba7dcb1c0309294355.exe
    "C:\Users\Admin\AppData\Local\Temp\f6903bdc8e406d0f679658726de4f6ef1d918046f429ecba7dcb1c0309294355.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1120

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\spoolsv.exe

          Filesize

          426KB

          MD5

          26bd6090ac6ed9f06e2a3d1373f1a902

          SHA1

          d466798240d35c67e8c5e03c0755e1de300cd633

          SHA256

          2706823ac98bad7c4b691d25fc26b1d6064368a859ddc6c590d3e1dbb77dcca4

          SHA512

          256a92a6c6d1aedbd1e5c8cb19906b50b62825ed51da9aa87b63a1f17f1723c48c133775958a77ffefedd192af51ccf1a84e79ade430def400bc55d5f63e0b61

        • memory/1120-58-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1120-59-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1456-54-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1456-57-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB