Analysis

  • max time kernel
    78s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:50

General

  • Target

    b50670e48fc3bfe9411fc256c1c78c1b553e7fba7fca572e9fa23365dd820080.exe

  • Size

    65KB

  • MD5

    597295614ee253687244e3414c3a23f0

  • SHA1

    1946bf4fd1ec3f8b1f251a90952cad623c1383a7

  • SHA256

    b50670e48fc3bfe9411fc256c1c78c1b553e7fba7fca572e9fa23365dd820080

  • SHA512

    5c936d74a2611686cc2533b1a544c92fccc2640f8a31dcd6bb340dd44e7d30a1ce5a701e6addef5f00ffbb98dffac81831a2b07968e27ced554f8a8a12f3c017

  • SSDEEP

    1536:2V0mTTtDOYjc9PqAnfWyGzAAClqKPLJ9mu6KoE9apYFsSPdkD6liAW2nylBZolwC:2DRUkf3hC4KPN936tE9PjdkD6liAWjl2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b50670e48fc3bfe9411fc256c1c78c1b553e7fba7fca572e9fa23365dd820080.exe
    "C:\Users\Admin\AppData\Local\Temp\b50670e48fc3bfe9411fc256c1c78c1b553e7fba7fca572e9fa23365dd820080.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1304
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1264-59-0x00000000775C0000-0x0000000077769000-memory.dmp

    Filesize

    1.7MB

  • memory/1264-60-0x0000000002160000-0x0000000002167000-memory.dmp

    Filesize

    28KB

  • memory/1264-62-0x00000000775C0000-0x0000000077769000-memory.dmp

    Filesize

    1.7MB

  • memory/1304-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

    Filesize

    8KB

  • memory/1304-55-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1304-56-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1304-57-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1304-58-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB