Analysis

  • max time kernel
    143s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:37

General

  • Target

    3a7c0ff1fae39363406c8004af71cea88d205a7854b60cde2b84cfe9dd435a28.exe

  • Size

    688KB

  • MD5

    9860857ae826db539e9b7ee6aac5a45f

  • SHA1

    731182257ec3679e4c98bd1d6bab868bfc67f7b0

  • SHA256

    3a7c0ff1fae39363406c8004af71cea88d205a7854b60cde2b84cfe9dd435a28

  • SHA512

    6342546c1a7fdd6f41fb43a3a9fda7de044fa9cc470195be638986e5adabb623cb136569a9234c99ed495b7118fbfbcd69b8caed31dca2ab0cf460a8052e4c61

  • SSDEEP

    12288:UsAqMGHGSX1388BxGpDVzUm9AzO+nhuTO6OUHvgTqShXNirBDVO4ZRPyk:UsBbWHzUmxPBD4TqCo84ZRKk

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7c0ff1fae39363406c8004af71cea88d205a7854b60cde2b84cfe9dd435a28.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7c0ff1fae39363406c8004af71cea88d205a7854b60cde2b84cfe9dd435a28.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    690KB

    MD5

    85c857e0a66f339aa4a14e4b0803ddbd

    SHA1

    4074cefb1e99d502a01d528d265d24b168c137b5

    SHA256

    f060f352bea3256c394b918ab76af7c205696eb9a781c2c53a75c2d52bf7e1d0

    SHA512

    3dc38300a46a0a248df4ffbcfac0589d99e79a913048501f9d8e003bdfe6c51fcfcf7873fe1379c68ff1b2d56a0bc5264ff3e9440c7e495de5883afbbb7e9dd0

  • memory/1444-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1444-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1928-55-0x0000000000000000-mapping.dmp

  • memory/1928-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1928-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB