Analysis

  • max time kernel
    143s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 15:07

General

  • Target

    72957bc0aedf6824888e25bc6c6afa7e1b861e5ef34b20c83c96ff66efbedeb4.exe

  • Size

    350KB

  • MD5

    441762a9006af7f983d0111f7199b98e

  • SHA1

    461974483df2411385f8087d95a999e340431f40

  • SHA256

    72957bc0aedf6824888e25bc6c6afa7e1b861e5ef34b20c83c96ff66efbedeb4

  • SHA512

    87581216b49ddfb763c6fa5bd70af869df42b8331a3d650d9d2bd19200c6ffce2e1afbea00799c4d2a26a1846a5203d642ba3621e04eacd26a08da581b3f5f11

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuft84FpJmWEHaMqToMr24NABR5FyhkMtoV:UsAAPF84FpJmCMqE34N6UhBi

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72957bc0aedf6824888e25bc6c6afa7e1b861e5ef34b20c83c96ff66efbedeb4.exe
    "C:\Users\Admin\AppData\Local\Temp\72957bc0aedf6824888e25bc6c6afa7e1b861e5ef34b20c83c96ff66efbedeb4.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    354KB

    MD5

    282063e20d76f8d335dbd8133e0de01c

    SHA1

    f42b8d2d424b4d4f47da7c6d0c53fa142dff16df

    SHA256

    940693691e92b1f6eb92654129850f581956bfd79a0804ef7d8ad91b769fbeb3

    SHA512

    02bf68e8345b86486a2f5a3bd4951ea40223b679bbd2f50e8d50418df466ff8be6755a53f91716e6e78e8de5974fd1671840967b075bc350fb2b49273dc3c284

  • memory/1332-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1332-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1768-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1768-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB