Analysis

  • max time kernel
    145s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:36

General

  • Target

    a117fd485f770fff0531ee0244e687efcc8a0b933249ab2977bae83017da125b.exe

  • Size

    380KB

  • MD5

    39bd4a7ead44dc8f844b89d9ceafbd15

  • SHA1

    f90b9d59c2afdffe9db11deafffb681d7355dcbc

  • SHA256

    a117fd485f770fff0531ee0244e687efcc8a0b933249ab2977bae83017da125b

  • SHA512

    1a0bb2e03c9170fac5594177976840fb0825487efff65b297b44e1135bfd3209b4222de7ffdcf99163cd448a6871f07647bb44e9ab9f8dfcb6c6f73e1f04bcb4

  • SSDEEP

    6144:MRAhhJxX7bNINTf4cC05nh+H02MzE+mCMNUxU1pAD7Dbir70wFrSL7ta4:UsAqMGHmzDmB51gvbvwUL7tZ

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a117fd485f770fff0531ee0244e687efcc8a0b933249ab2977bae83017da125b.exe
    "C:\Users\Admin\AppData\Local\Temp\a117fd485f770fff0531ee0244e687efcc8a0b933249ab2977bae83017da125b.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    380KB

    MD5

    496d75fe9716a38b2f24dfcbd8beddfa

    SHA1

    6aafd1c337afd0beb0baba2a8d9935d43c349473

    SHA256

    2b8c980a96067e91d7b34261729fde0a33158ff366baa6d670975e78848d0d7d

    SHA512

    ef94c47d52139cbe2efc94c7af5ba754e5af9c66c0b5e9b5dc45a65d8ed2c1249e6f32af5f3830805eaad1cfff4d60935ac1f4c3afc6044fd3d8a7c45375a4cf

  • memory/1000-55-0x0000000000000000-mapping.dmp

  • memory/1000-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1000-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1672-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1672-56-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB