Analysis

  • max time kernel
    139s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 02:45

General

  • Target

    Label_LU.exe

  • Size

    119KB

  • MD5

    1337dd75f7a43ae8cbb00727b5576baf

  • SHA1

    d26698bee1292cfe0bd0acd9c9c66d64f02e0486

  • SHA256

    031540bc74e2d04f4165fd63a2e72f112a1deca2896308637ccbfd50f08523a0

  • SHA512

    d86500dacd9f82dbdf82f874728fd08d3d9359f943177ed044f2592b7fd133c1247bdb8fce94777c3e84e44ae6eb4652067ad91d2c9c8ecc8eb4e425e0d8d12f

  • SSDEEP

    3072:MyPWFq7RlwGL/5CSmk5pb6nVyh/dy7a5wgHmc:Sq7R6GL/5CSmk5Yoh/egHx

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Label_LU.exe
    "C:\Users\Admin\AppData\Local\Temp\Label_LU.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds Run key to start application
      PID:1880

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1788-54-0x0000000000020000-0x0000000000034000-memory.dmp
    Filesize

    80KB

  • memory/1880-56-0x0000000000000000-mapping.dmp
  • memory/1880-57-0x0000000076201000-0x0000000076203000-memory.dmp
    Filesize

    8KB

  • memory/1880-58-0x0000000000700000-0x0000000000708000-memory.dmp
    Filesize

    32KB

  • memory/1880-59-0x0000000000080000-0x0000000000091000-memory.dmp
    Filesize

    68KB

  • memory/1880-60-0x00000000003F0000-0x0000000000470000-memory.dmp
    Filesize

    512KB