Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:06

General

  • Target

    6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe

  • Size

    150KB

  • MD5

    40ad08a727e110a5358e9de4e48beb8b

  • SHA1

    ecfd82bf3918c0d24f3006c8f145366a452c6de0

  • SHA256

    6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702

  • SHA512

    a386d002d0f128117de98baf4578453eb518b9a6d21298661752356243d336c6f24806cd1531c356388e22dac77d09e154f27070cc8a0570720ef73858008200

  • SSDEEP

    1536:N1O/esjj4EaaiLn/DZHBOgCXhUbkf1IPiK5NhCXhiIuOH5Y+q1jGJyVZGC86jOr8:NBmj4+yD143UO1UiEGL76+qFWyVg6R

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe
    "C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds Run key to start application
      PID:1992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1636-54-0x0000000000230000-0x0000000000244000-memory.dmp

    Filesize

    80KB

  • memory/1992-56-0x0000000000000000-mapping.dmp

  • memory/1992-57-0x0000000075E51000-0x0000000075E53000-memory.dmp

    Filesize

    8KB

  • memory/1992-58-0x00000000009C0000-0x00000000009C8000-memory.dmp

    Filesize

    32KB

  • memory/1992-59-0x00000000000C0000-0x00000000000D1000-memory.dmp

    Filesize

    68KB

  • memory/1992-60-0x00000000001D0000-0x0000000000250000-memory.dmp

    Filesize

    512KB

  • memory/1992-61-0x00000000001D0000-0x0000000000250000-memory.dmp

    Filesize

    512KB