Analysis

  • max time kernel
    67s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 22:01

General

  • Target

    c56391d103de7c926875b94c5eecb3a06c349d3f3185ce5554346b6fadf9e2a9.exe

  • Size

    200KB

  • MD5

    a382a56a323c74b4be99956a226595af

  • SHA1

    58700403ae56be603d1427e2bd48edf4c842f09d

  • SHA256

    c56391d103de7c926875b94c5eecb3a06c349d3f3185ce5554346b6fadf9e2a9

  • SHA512

    ff1ea99a4e3b25f28364c68ed84ac68c9d22e838c84561196048deb353425eba9caa6c4d11d8752b68eacca9d3737c6a810dd051e53f3ce32c4ef3ab43391927

  • SSDEEP

    3072:5rbGyALtpAehesL5bEGsMgA9NFDn1q2ZRg9HQ6nae8m6+s:5vW8M5bEEgEFxq2ZRg9wI1sR

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c56391d103de7c926875b94c5eecb3a06c349d3f3185ce5554346b6fadf9e2a9.exe
    "C:\Users\Admin\AppData\Local\Temp\c56391d103de7c926875b94c5eecb3a06c349d3f3185ce5554346b6fadf9e2a9.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:364
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{1824FD18-E712-D9AE-36A7-B78964E091EE}" /f
      2⤵
        PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C56391~1.EXE > nul
        2⤵
        • Deletes itself
        PID:1724

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/364-55-0x0000000076681000-0x0000000076683000-memory.dmp

            Filesize

            8KB