Analysis

  • max time kernel
    150s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:36

General

  • Target

    862d8dae5f723df03464f4df923596f7dea0ebe56fad83c9a0fd935ef8e2d96a.exe

  • Size

    290KB

  • MD5

    997ef50a123833428b524c81207cbb68

  • SHA1

    a9be6965ab94c919dfa77a4e22a4b85c4832cb1e

  • SHA256

    862d8dae5f723df03464f4df923596f7dea0ebe56fad83c9a0fd935ef8e2d96a

  • SHA512

    da2c502410583a8293b0767789886d4f5409d985d6a9a46f6afeeb197b8f643f4ab7fd0b162ae07d422634dc20226dc2e8d4ccbb1f77351f7a476502ea28496b

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuft0Mt+til+XDVL4pYyi9Akx2yfjAlEeQ/FxqW4/V+:UsAAPF0Mt+Il+z9yin7ze5V+

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\862d8dae5f723df03464f4df923596f7dea0ebe56fad83c9a0fd935ef8e2d96a.exe
    "C:\Users\Admin\AppData\Local\Temp\862d8dae5f723df03464f4df923596f7dea0ebe56fad83c9a0fd935ef8e2d96a.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    294KB

    MD5

    bdd269dcec2c13ef54303a9df106c8d5

    SHA1

    a46e5c47201084404bcb9239138c46bbb9dd03e5

    SHA256

    dc20196cadfc38bf651b1d23d86dfba95b9bc1bcb77e9ce0dc1b1a8c9db33679

    SHA512

    08b05026e5e8a1f101fe7c836ed8f959037b467b0078802c11d277368f4c30f42e6192aa34aa2f263f310b541b637dad7b4a97e07f252d72510c808c048b2012

  • memory/316-55-0x0000000000000000-mapping.dmp

  • memory/316-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/316-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1180-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1180-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB