Analysis

  • max time kernel
    144s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:40

General

  • Target

    bfd3efeddbdbdc28954e2b73d51c670db61c26c6b48a77b70a5280b7ccffa1c7.exe

  • Size

    763KB

  • MD5

    963716cdf16160ab4dcff82584b5b380

  • SHA1

    e361e56c9505f29f58dee3e81b4ad03a58e309bd

  • SHA256

    bfd3efeddbdbdc28954e2b73d51c670db61c26c6b48a77b70a5280b7ccffa1c7

  • SHA512

    293f506b10a7af4f40f4935b054004e8a4eddb37ca9cbe281bb2dfd5645c6785b74fffc288b56397dc661799108714d9e30cbe57d474edffce4896b7662ac8cc

  • SSDEEP

    12288:UsAAPaPUD18t/R/OgRs6dBFnD0YvK2CSzfC26NE44oT/TEgIUpxT+zJpdW6qVB64:UsMP7tMEs6dfoYvZfmiDo8gpl+92dBdN

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfd3efeddbdbdc28954e2b73d51c670db61c26c6b48a77b70a5280b7ccffa1c7.exe
    "C:\Users\Admin\AppData\Local\Temp\bfd3efeddbdbdc28954e2b73d51c670db61c26c6b48a77b70a5280b7ccffa1c7.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    765KB

    MD5

    eab7d5b7e065082ba678a3989fb71950

    SHA1

    0f53ffa8a5a2d5fe19443f5ed17d12f07ece89c7

    SHA256

    d9895f0333de2aac24fe40ff35a7cbdc6d71c4fc812baea1398f287d8a29d8ea

    SHA512

    610a5889600e11389c7cff8943fd8e4fc1cf5cdf9db3a7332c052cd544bcf476546a0a844c4cb62d185ec896beebdf22e9d1826e73ced944efa66831f8286c44

  • memory/1052-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1052-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1424-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1424-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB