Analysis

  • max time kernel
    151s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 21:52

General

  • Target

    ec0daa3e40dd36bd2e39cdc833bd7ee9d176b48485be06fae50391e6e45b0af6.exe

  • Size

    108KB

  • MD5

    e478f4a5702d2d1db3955b34d4bafe70

  • SHA1

    c582678b884075ad873fb79bea641e6ef69af8db

  • SHA256

    ec0daa3e40dd36bd2e39cdc833bd7ee9d176b48485be06fae50391e6e45b0af6

  • SHA512

    da64bba0e41aa168949c7f236863b08efbbd9a21fab6acb63de6e532405bce34dffc9b781c7d5f600400c8ee0b689c614f6407b9644d10fcca6df12b97c9a303

  • SSDEEP

    768:dvmKZor4WvMzGBrxUv7SBEMoI9Ta0XZdPQWI9Ta0XZdPQghWcCrYW1TARcS4SFBZ:dvmKZozvMzmNiMzMF0CyJrG0CoMAtO

Score
8/10

Malware Config

Signatures

  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec0daa3e40dd36bd2e39cdc833bd7ee9d176b48485be06fae50391e6e45b0af6.exe
    "C:\Users\Admin\AppData\Local\Temp\ec0daa3e40dd36bd2e39cdc833bd7ee9d176b48485be06fae50391e6e45b0af6.exe"
    1⤵
    • Looks for VMWare Tools registry key
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:1720

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1720-54-0x00000000757A1000-0x00000000757A3000-memory.dmp
    Filesize

    8KB