Analysis

  • max time kernel
    130s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:35

General

  • Target

    ee2fa72e08685370dd0803ed74c9cecd92810069c8ddda8e77cb34aedbdd8d47.exe

  • Size

    417KB

  • MD5

    b4199cd4eaec08d748523d44de37bc00

  • SHA1

    67803c452fa3efb8c007dcd51824eaef8b84aba9

  • SHA256

    ee2fa72e08685370dd0803ed74c9cecd92810069c8ddda8e77cb34aedbdd8d47

  • SHA512

    4f0ba3b5e8aa3ba5133ac713500ff929ac723b95a6538283022da00072f9235f31705062681fda846d6d40d0d7a56ee7af1342ed6f2499dffcdddd9b79a42440

  • SSDEEP

    6144:MRAhhJxX7bNIFlJYe5hhbc9FTPweCZjIxUNo5yLqUOHYyi4DrizFNeRXap:UsA1pbaCZzNUTUDyi4DrUeRS

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee2fa72e08685370dd0803ed74c9cecd92810069c8ddda8e77cb34aedbdd8d47.exe
    "C:\Users\Admin\AppData\Local\Temp\ee2fa72e08685370dd0803ed74c9cecd92810069c8ddda8e77cb34aedbdd8d47.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    423KB

    MD5

    a5a65910435a79d176ff4d1e351f1f4c

    SHA1

    059208a7e2cd4a896c31222d8afdce0ed407a845

    SHA256

    f90149dd1fffea733184d415a4e278a4889d934bca350d9e9b8cfac96b0fd704

    SHA512

    9665a4e8bf87acf1289428646f87dd5e796431c6a179c54fc11fadecde0edebaeb20b7b413cb25fabdef3f86aaa9c7ca032bfd3194f183b608414cb28027ccc9

  • memory/1336-55-0x0000000000000000-mapping.dmp

  • memory/1336-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1336-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1492-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1492-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB