Analysis

  • max time kernel
    145s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 14:31

General

  • Target

    b4ccd84e6313bef201788d8beb998f8ff7ccb7e0da86f9291e32517173aadd8a.exe

  • Size

    372KB

  • MD5

    93b6845fd7e9992bf947fe8168625760

  • SHA1

    cabf5e62130499ab33afe8609d2a4ee98a71b4a9

  • SHA256

    b4ccd84e6313bef201788d8beb998f8ff7ccb7e0da86f9291e32517173aadd8a

  • SHA512

    cf1202fb9e5a794f0cb552cc01ac33564f6b0777181a4f3e393ea7e6446df22f87ad444a13183a34569d203c38b1e075c89af271bc51a31aedbc7f5bc1670706

  • SSDEEP

    6144:MRAhhJxX7bNIFlx6W3q5j1SX7GHtSFs91oS2VJm0acsd54lW0WxhSH+4U:UsAYDj8X7GHtEs9edzpzTNH+n

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4ccd84e6313bef201788d8beb998f8ff7ccb7e0da86f9291e32517173aadd8a.exe
    "C:\Users\Admin\AppData\Local\Temp\b4ccd84e6313bef201788d8beb998f8ff7ccb7e0da86f9291e32517173aadd8a.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    373KB

    MD5

    b6e62177bc9ce293b451f103f8472b5c

    SHA1

    32a841ad3146a401bb782135ff617d6259088f3c

    SHA256

    d2f7c6b9964a292f6941a29d9117302c379f73af83fd9aad964b368267973aca

    SHA512

    acedd400f7a3ae6cdf2ff58c4e702e79fb98f2004364c5e4ccd53450c8c32cec585bf1df5ea0375b7b4b588524d9aa16ec9d9250862eda22398032f298957c6c

  • memory/864-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/864-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1756-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1756-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB