Analysis

  • max time kernel
    129s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 05:28

General

  • Target

    327bdfe2dbe0341cd5a6a8e09529d4d5978f824bca07cf3675d76a33ef2843b6.exe

  • Size

    341KB

  • MD5

    6245122a19c32c314a2745188d41bcbc

  • SHA1

    c19a348909e8f586a9ac9b52036bd41557e2ce45

  • SHA256

    327bdfe2dbe0341cd5a6a8e09529d4d5978f824bca07cf3675d76a33ef2843b6

  • SHA512

    f8135ae7751695b6db9afffcc5be4f9e91b8925b68aea6736ead410417218152dbfa9b8503deb6d38f6a76e0185cb3372043594c7f8419704d78164952b7eb34

  • SSDEEP

    6144:MRAhhJxX7bNIKTQEgjX6mH/0guFK+s53RbAg0xqj3YR783L/zLP:UsALwmf0g2nsLAg0DRQb/P

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\327bdfe2dbe0341cd5a6a8e09529d4d5978f824bca07cf3675d76a33ef2843b6.exe
    "C:\Users\Admin\AppData\Local\Temp\327bdfe2dbe0341cd5a6a8e09529d4d5978f824bca07cf3675d76a33ef2843b6.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    21KB

    MD5

    861537614a80e013cb2308e0e767f52a

    SHA1

    2ef6568090a8ee5ed3b09125a74bcb5f8f040e44

    SHA256

    c0b0202660ff1d8fd9de13c7316d057afe69fd2d503061f22c1bce3e46ee914e

    SHA512

    f8b97e92a81b732f9852cfaf349b4189e1a0f0e493dad35905dcce846b66bb5013623e4eabd501b823716fd79747497996fbc05da671fcac5e90ac75afc8c257

  • memory/1456-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1836-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1836-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB