Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2022 08:50

General

  • Target

    58f3bfbf292c64d562769464560b7b2def8f4ab53416b1487597feba01cbbc5b.exe

  • Size

    67KB

  • MD5

    0a5219b5850b3712794512d2b67b059b

  • SHA1

    fae1dcb0a6f648416b7a91f0c81cad92a218bb1e

  • SHA256

    58f3bfbf292c64d562769464560b7b2def8f4ab53416b1487597feba01cbbc5b

  • SHA512

    bd693d2c73bbf60e2ebebe06f8515690fe424877fd20a22259c7e8415d4500cfbd533fcd3597e292b12d0956d9b93b1fa82d2ead61b71b0b65aab6e0a97fb4d6

  • SSDEEP

    1536:fEdoEpsCcGhAKU5PqKiMH7IELu8M0hHNufjq85:QoE+ppPqgbhZMoHNufj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58f3bfbf292c64d562769464560b7b2def8f4ab53416b1487597feba01cbbc5b.exe
    "C:\Users\Admin\AppData\Local\Temp\58f3bfbf292c64d562769464560b7b2def8f4ab53416b1487597feba01cbbc5b.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1904
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:2044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1256-58-0x00000000772F0000-0x0000000077499000-memory.dmp

      Filesize

      1.7MB

    • memory/1256-59-0x0000000002AC0000-0x0000000002AC9000-memory.dmp

      Filesize

      36KB

    • memory/1256-61-0x00000000772F0000-0x0000000077499000-memory.dmp

      Filesize

      1.7MB

    • memory/1904-54-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1904-55-0x00000000762D1000-0x00000000762D3000-memory.dmp

      Filesize

      8KB

    • memory/1904-56-0x0000000001BE0000-0x0000000001C10000-memory.dmp

      Filesize

      192KB

    • memory/1904-57-0x0000000001BE0000-0x0000000001C10000-memory.dmp

      Filesize

      192KB

    • memory/2044-62-0x0000000000000000-mapping.dmp