Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 16:26

General

  • Target

    05215df9e3ae7571465957757151ce1a5b971ccc42fc75122d3a0b6336ef4954.exe

  • Size

    144KB

  • MD5

    960c7973d634f18a16abd5480ef0e995

  • SHA1

    dcf48acc48d8b419169d8f14d72d15fd7077746b

  • SHA256

    05215df9e3ae7571465957757151ce1a5b971ccc42fc75122d3a0b6336ef4954

  • SHA512

    f746f171122fe8168f188f067cbd2323af362b9a37554cdc3544c6758fa648c4494d6186eb7e24618d2578d9455b03b6816e4b061e3dbdf1476e3ad7a3348e27

  • SSDEEP

    3072:hGq8aX6X/AVHK4buyianNpf+NVZe1eZan12YMt9TEGB:fnKXqHLuynTf+NVZha1JMtZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies data under HKEY_USERS 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05215df9e3ae7571465957757151ce1a5b971ccc42fc75122d3a0b6336ef4954.exe
    "C:\Users\Admin\AppData\Local\Temp\05215df9e3ae7571465957757151ce1a5b971ccc42fc75122d3a0b6336ef4954.exe"
    1⤵
    • Drops file in System32 directory
    PID:1340
  • C:\Windows\SysWOW64\mshjtmbs.exe
    C:\Windows\SysWOW64\mshjtmbs.exe /service
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\mshjtmbs.exe

    Filesize

    144KB

    MD5

    afa8d8e15b42333742274f089b45b1da

    SHA1

    18ba16ffd89577e4c5a077cabd80bdae4670ef45

    SHA256

    c88a9673d54bc0d6f291057b597bd65b70a9055f4b9c9b188df189c7cfe3fe92

    SHA512

    2c27e88fea4b3dc6091e4bf4eecb1c0c8c16262278370f18da8d82a1dd8be6b45a9bec98add56ef27c8e87c3485b8be6c80d9935b3ebe7fb4fd676592afe5485

  • memory/1340-54-0x0000000076041000-0x0000000076043000-memory.dmp

    Filesize

    8KB

  • memory/1340-56-0x0000000000230000-0x0000000000259000-memory.dmp

    Filesize

    164KB

  • memory/1340-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1340-57-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1380-60-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1380-61-0x00000000001C0000-0x00000000001E9000-memory.dmp

    Filesize

    164KB

  • memory/1380-62-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1380-63-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB