Analysis

  • max time kernel
    147s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 09:43

General

  • Target

    67d6dc5f7dcf4f4985cc2916f0a467a5ab0a943367c0fd947370379c2ce28293.exe

  • Size

    394KB

  • MD5

    80f2e1ca43df85a103d652f06a3f5ac0

  • SHA1

    f5d3dec94884e83ee61b4cffb403a30ad0046348

  • SHA256

    67d6dc5f7dcf4f4985cc2916f0a467a5ab0a943367c0fd947370379c2ce28293

  • SHA512

    aa05fa018d6aabbbd303f3fc06db55d18f78ef2bf95eb8b7f75fdabcbcc8f8e692d38711dc09d3e56628818d71ab44f564eafbf99d3fc077d30656d0b7d4f48b

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuaGzLcv0vs+Tt9GtJpPk3k69Y1ZAYknoI3fYSzz8s536qr7:UsAAPaGgN+7GJTZsoI3rz8C6qVN

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67d6dc5f7dcf4f4985cc2916f0a467a5ab0a943367c0fd947370379c2ce28293.exe
    "C:\Users\Admin\AppData\Local\Temp\67d6dc5f7dcf4f4985cc2916f0a467a5ab0a943367c0fd947370379c2ce28293.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1364

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\spoolsv.exe

          Filesize

          395KB

          MD5

          d79484abad05091dab7b1abe7061b9bd

          SHA1

          b3fa91e38f532a66b4c71d138e4215610d46d14a

          SHA256

          e5d601a20e8818ae47ead26a3a1295a32ded577e0644ff4db1a6239ecb354669

          SHA512

          5ea20017d934ba9ef8a8ec57a6cbc5a1121adecb76f6be7ca7e665c19c90d7d9d77162f96f8182fc269ff70985aa3e28e9810884627a876cfcc8730997229f28

        • memory/1364-58-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1364-59-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1896-54-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1896-57-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB