Analysis

  • max time kernel
    176s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:53

General

  • Target

    7d45ce95974a4862c0a7bb6e5b0b1744452d627c6ca75f5ea77c2e8e46c82d84.exe

  • Size

    58KB

  • MD5

    c937085ab627d4a88dc87cd4e9a7c916

  • SHA1

    4f29316905c894b1042d3826a3a65acce931d0ba

  • SHA256

    7d45ce95974a4862c0a7bb6e5b0b1744452d627c6ca75f5ea77c2e8e46c82d84

  • SHA512

    60f06ddc21a3478911480fc6df0e6116200ef0133b19419c1f7efce45d566f21c21a1a429154528954f13fed7fb8466d32bd9547a66f4c7bb2a27cd82b4cd827

  • SSDEEP

    768:C9id8zWWIJ5xJn98+DqljcqvNBe0s5IAnXxujpjIOjF7jXHx:C9PqWIJl98+DqlFNI0whXxujRIUF

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d45ce95974a4862c0a7bb6e5b0b1744452d627c6ca75f5ea77c2e8e46c82d84.exe
    "C:\Users\Admin\AppData\Local\Temp\7d45ce95974a4862c0a7bb6e5b0b1744452d627c6ca75f5ea77c2e8e46c82d84.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1668
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1232-62-0x0000000077B60000-0x0000000077D09000-memory.dmp

    Filesize

    1.7MB

  • memory/1232-64-0x0000000002110000-0x0000000002117000-memory.dmp

    Filesize

    28KB

  • memory/1668-54-0x0000000076711000-0x0000000076713000-memory.dmp

    Filesize

    8KB

  • memory/1668-55-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1668-57-0x0000000000400000-0x0000000000414200-memory.dmp

    Filesize

    80KB

  • memory/1668-56-0x0000000000400000-0x0000000000414200-memory.dmp

    Filesize

    80KB

  • memory/1668-58-0x0000000000400000-0x0000000000414200-memory.dmp

    Filesize

    80KB

  • memory/1668-59-0x0000000000300000-0x0000000000315000-memory.dmp

    Filesize

    84KB

  • memory/1668-60-0x0000000000400000-0x0000000000414200-memory.dmp

    Filesize

    80KB

  • memory/1668-61-0x0000000000400000-0x0000000000414200-memory.dmp

    Filesize

    80KB