Analysis

  • max time kernel
    41s
  • max time network
    106s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 14:37

General

  • Target

    6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe

  • Size

    828KB

  • MD5

    0619218e04a3d1a17a7e6cebaecc4140

  • SHA1

    a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6

  • SHA256

    6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7

  • SHA512

    d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15

  • SSDEEP

    12288:fdHJ8EEBe4r1bUgkV0esV/Uf8kCw4DywAsKypnNv6twG3TB0UYnL8of:3hMtUb0q8E4DywAWNCmGjBY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe
    "C:\Users\Admin\AppData\Local\Temp\6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe
      C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 3&del C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1096
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 3
          4⤵
          • Runs ping.exe
          PID:1780

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe

          Filesize

          828KB

          MD5

          0619218e04a3d1a17a7e6cebaecc4140

          SHA1

          a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6

          SHA256

          6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7

          SHA512

          d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15

        • C:\%36%32%31%38%61%64%64%39%32%30%62%31%65%62%62%30%32%37%37%37%66%33%37%61%65%65%62%66%38%35%62%32%33%65%33%61%37%61%39%37%31%39%63%37%64%38%30%39%37%30%38%36%38%31%39%33%34%37%39%31%39%34%62%37.exe

          Filesize

          828KB

          MD5

          0619218e04a3d1a17a7e6cebaecc4140

          SHA1

          a2c1a343fb2fdc11bac980cd95d8bf439a2d07d6

          SHA256

          6218add920b1ebb02777f37aeebf85b23e3a7a9719c7d80970868193479194b7

          SHA512

          d0299801b63aba687abd460af9da0f6415c5ecc694bd7da57a3f5b667b5a74111adc8148a7b7c7e83cfd41a50c23e251280206946ad01d9bdf66927692981e15

        • memory/1972-61-0x0000000000400000-0x0000000000501000-memory.dmp

          Filesize

          1.0MB

        • memory/1972-65-0x0000000000400000-0x0000000000501000-memory.dmp

          Filesize

          1.0MB

        • memory/1992-54-0x0000000000400000-0x0000000000501000-memory.dmp

          Filesize

          1.0MB

        • memory/1992-55-0x0000000076141000-0x0000000076143000-memory.dmp

          Filesize

          8KB

        • memory/1992-59-0x0000000002470000-0x0000000002571000-memory.dmp

          Filesize

          1.0MB

        • memory/1992-60-0x0000000002470000-0x0000000002571000-memory.dmp

          Filesize

          1.0MB

        • memory/1992-62-0x0000000000400000-0x0000000000501000-memory.dmp

          Filesize

          1.0MB