Analysis

  • max time kernel
    34s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 08:41

General

  • Target

    cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812.exe

  • Size

    541KB

  • MD5

    14fce07dc8bfc33d905c6db97ab69680

  • SHA1

    cd416876cac5670715d94629429798fba3f7ca5f

  • SHA256

    cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812

  • SHA512

    a9345f8a1d1bdfec96b6323d4c9108a08352904c21d08ef8fb76230d9918030bb4b0f659afb4d12dd16b3ea4beb042946cd6b424419530c08984347540e35017

  • SSDEEP

    12288:2DDTfY9qtgWjOdB0+gJfY9qtgWjOdB0+g:2DDTT+ET+

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1224
      • C:\Users\Admin\AppData\Local\Temp\cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812.exe
        "C:\Users\Admin\AppData\Local\Temp\cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\AppData\Local\Temp\cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812.exe
          "C:\Users\Admin\AppData\Local\Temp\cd53fd7915c0fe8401afe5bbd5031397ba33ef654103e04d8ba51d28a7962812.exe"
          3⤵
            PID:788

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/788-57-0x00000000011D0000-0x000000000125C000-memory.dmp

        Filesize

        560KB

      • memory/1224-58-0x0000000002190000-0x0000000002191000-memory.dmp

        Filesize

        4KB

      • memory/1404-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

        Filesize

        8KB

      • memory/1404-60-0x00000000011D0000-0x000000000125C000-memory.dmp

        Filesize

        560KB

      • memory/1404-61-0x00000000000F0000-0x000000000017C000-memory.dmp

        Filesize

        560KB