Analysis

  • max time kernel
    141s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:37

General

  • Target

    2f0c29983bea934f6e27aa1645e9a0c28e69380c02f8091aae7d2928cc70cbea.exe

  • Size

    204KB

  • MD5

    5ed27d3053cc656a600e448fecaab496

  • SHA1

    4b772f271bb7d86c9913445960fed614a052506b

  • SHA256

    2f0c29983bea934f6e27aa1645e9a0c28e69380c02f8091aae7d2928cc70cbea

  • SHA512

    b2c15d189ad359ab7870e150d23ffe72e540b2f2ce6b4fa00180e2fda3ebf8cf343b2ef6c2b9ad7ca98d92fa1d5f1cdda15c8f1c38edf606300ee4dc9b36dcd7

  • SSDEEP

    3072:MRAhhcsxgAJuK7bZD01GoI0ON27Usy3/ROzTUF//OE1BMypoxccchtcFBJ1knDx:MRAhhJxX7bNIAROzTsxoyp3wrJ1knDx

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f0c29983bea934f6e27aa1645e9a0c28e69380c02f8091aae7d2928cc70cbea.exe
    "C:\Users\Admin\AppData\Local\Temp\2f0c29983bea934f6e27aa1645e9a0c28e69380c02f8091aae7d2928cc70cbea.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    209KB

    MD5

    e58ff7f26d45335a1c2d34f170047fca

    SHA1

    9ba69804a714f370cc8a5598ff982bd5d72cb395

    SHA256

    70e5420e84e04bba2d88e276ba8d88aa1ad8ef0a05a63507f3455924d4e7f01d

    SHA512

    c131fbce237af413cbd78b30f8be330827ba92d797d613fcb047eee6dfe51c188d8742043c408fc3fa6e15aaf695660ee6094f0c583fa744833f034393a4d881

  • memory/952-55-0x0000000000000000-mapping.dmp

  • memory/952-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/952-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1812-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1812-56-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB