Analysis

  • max time kernel
    3s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 08:46

General

  • Target

    0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d.exe

  • Size

    106KB

  • MD5

    04490e8092b1f83965593bfd777e4c20

  • SHA1

    90242fdf484092c9c117845a1e0b06c53a194444

  • SHA256

    0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d

  • SHA512

    f2476253a8d6a637162da2971fe7b643ce12e5e10283d8092fb04fc6e7e75f0d53c2b77f3690f17867da657993c8e298ac6edeff61e600e6d5faac538c26f201

  • SSDEEP

    3072:Q1lJg4ojJvNBOUXIMNlRFIiqh3z7UQmU3:Q1T6pOUXIMNlsilU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d.exe
        "C:\Users\Admin\AppData\Local\Temp\0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Users\Admin\AppData\Local\Temp\0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d.exe
          "C:\Users\Admin\AppData\Local\Temp\0292730e95aac9afbd2bcbf73483508c3aacd5fa1452b8dd8ff3fc43f449432d.exe"
          3⤵
            PID:904

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/904-55-0x000000002FAD0000-0x000000002FAED000-memory.dmp

              Filesize

              116KB

            • memory/1208-56-0x00000000021F0000-0x00000000021F1000-memory.dmp

              Filesize

              4KB

            • memory/1964-58-0x000000002FAD0000-0x000000002FAED000-memory.dmp

              Filesize

              116KB

            • memory/1964-59-0x00000000000F0000-0x000000000010D000-memory.dmp

              Filesize

              116KB