Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2022 11:36

General

  • Target

    ddb59cc1d17356372a7c0bd76b4bef4828922e4dd5a6e36cd7a972ddca264a8c.exe

  • Size

    344KB

  • MD5

    30968fa627e208af7bd17718a286c26e

  • SHA1

    4aad0d7b28ed5be80797956d033f096861202424

  • SHA256

    ddb59cc1d17356372a7c0bd76b4bef4828922e4dd5a6e36cd7a972ddca264a8c

  • SHA512

    72ad03eb7d8da80169ba1fe1d286752d9c17ef31048c98dd1de6df6956e5fb76000dbca3565231083e20a06a1ed57bcf0688f0ac85761e071b988ec8b03128d6

  • SSDEEP

    6144:Lgvo5luxSrwwEAVQptNfaPnSxSrkdA0XRnMGhr91lOUrHzb4PHlutJFUwr/:MvqlqSrzEAupLiPuSrN0hMa8UrHH4P8d

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 7 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddb59cc1d17356372a7c0bd76b4bef4828922e4dd5a6e36cd7a972ddca264a8c.exe
    "C:\Users\Admin\AppData\Local\Temp\ddb59cc1d17356372a7c0bd76b4bef4828922e4dd5a6e36cd7a972ddca264a8c.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 544
      2⤵
      • Program crash
      PID:796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/796-56-0x0000000000000000-mapping.dmp

  • memory/2000-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB

  • memory/2000-55-0x0000000001000000-0x000000000116F000-memory.dmp

    Filesize

    1.4MB

  • memory/2000-57-0x0000000001000000-0x000000000116F000-memory.dmp

    Filesize

    1.4MB