Analysis

  • max time kernel
    40s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2022 20:18

General

  • Target

    4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe

  • Size

    27KB

  • MD5

    969cf56ba5d9f9f7658a28f3d76af380

  • SHA1

    7a2932d9d25d98b82b508de6d571a591be30c1f5

  • SHA256

    4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0

  • SHA512

    6f6865a4be78964676d2632b0b822381aa9c2bf7a3c3ef58e5343df86570b2637c798a8c57ad60daa10ba025d9d96815a2d5cb06890900df3fccc2db1bc611cc

  • SSDEEP

    384:lijuGXOsa32vAmJDmX93THDezUt099d9SoHeZrF1EoU6t518gpmvDUlLg:lijuGboSDy9Lt0L8ZrFq81bp5lL

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe
    "C:\Users\Admin\AppData\Local\Temp\4fc3b7a1489c7b65c17a90e3a516b437ae417d513b08879803140a91f1a06cc0.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Deletes itself
      PID:1684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-59-0x0000000075571000-0x0000000075573000-memory.dmp

    Filesize

    8KB

  • memory/1684-60-0x00000000006D0000-0x00000000006D8000-memory.dmp

    Filesize

    32KB

  • memory/1684-61-0x0000000000080000-0x0000000000086000-memory.dmp

    Filesize

    24KB

  • memory/1684-62-0x0000000000090000-0x00000000000A8000-memory.dmp

    Filesize

    96KB

  • memory/1684-63-0x0000000000090000-0x00000000000A8000-memory.dmp

    Filesize

    96KB

  • memory/1872-54-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1872-55-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1872-56-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1872-58-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB