Analysis

  • max time kernel
    145s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 00:50

General

  • Target

    e57809ced77554347e7db832a0480f882bbb3e35d5e0107aebb04236b75fc8a0.exe

  • Size

    493KB

  • MD5

    a1bffd99e5f31eea010b2535364ca9a0

  • SHA1

    78fd7f842962d687c31501cf5f1723a111fd98fa

  • SHA256

    e57809ced77554347e7db832a0480f882bbb3e35d5e0107aebb04236b75fc8a0

  • SHA512

    658468638c3a473c90e453517d928671c7c6506dabc1202c6f27087b34132728b5b9fb5ac2806421967b2ac52ed47d24b5ea8cbdcc7d3561bc5dfe43a418f5d1

  • SSDEEP

    12288:UsA1mIRjZ1RtYoWjCe+OYs+V48M7hCeMbyqgSTQMR9l5CT:UsnIP1RtYo2CerWvM7seMWe395CT

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e57809ced77554347e7db832a0480f882bbb3e35d5e0107aebb04236b75fc8a0.exe
    "C:\Users\Admin\AppData\Local\Temp\e57809ced77554347e7db832a0480f882bbb3e35d5e0107aebb04236b75fc8a0.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    494KB

    MD5

    da5f3da5f48a4145d16448af3a847880

    SHA1

    fb15baf3b52643bbd0eaf2961d2b619cfdb82329

    SHA256

    5dc68e91df0831037ac0377c9beedef77edc61c5fe6eb0c1e435fdc2402d8324

    SHA512

    507b57613b4d3ca42fe36f5522af652806f815392fd983db8af7f4def64f2e39cd7df2567049b3b42401bb39c74da1a33f35641a7bd633367d6a5f45cfe0e26d

  • memory/1112-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1112-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1908-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1908-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB