Analysis

  • max time kernel
    136s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 21:54

General

  • Target

    2081778aef96c33e506163638c372230bc8ff288862fda5a968c84b9dfa83d5a.exe

  • Size

    596KB

  • MD5

    fd0df2f8286101485736aff0fb72571d

  • SHA1

    ea80199966d1ecf8724d84319d2081f027bc0423

  • SHA256

    2081778aef96c33e506163638c372230bc8ff288862fda5a968c84b9dfa83d5a

  • SHA512

    41fabeb4df7b18dfd608df88cded152bf793001108007bd52b54e6ca3d70404d90acc7b4c582ba7bc5632bd429b3bcfde9442277d34316e612dab5a184b8554d

  • SSDEEP

    12288:UsAqMGHGSX1388BxGVILSY4oSe8lU6t3p7t48xmc4QdQ3nc+Rujw7E:UsBbWOSY4He8Vj48Qc4ls+0cY

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2081778aef96c33e506163638c372230bc8ff288862fda5a968c84b9dfa83d5a.exe
    "C:\Users\Admin\AppData\Local\Temp\2081778aef96c33e506163638c372230bc8ff288862fda5a968c84b9dfa83d5a.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    597KB

    MD5

    6d6c51c3f4f6b7e4579f75537171eb51

    SHA1

    d9916489359d6ea5038376634e509e880f9596de

    SHA256

    630cdfd09f971a3f7189681d345615a1d2c1ec54e637d984ef4545112af5268c

    SHA512

    0a456193151e573dabd1392362161fc79402eaf22e9a58b17c15189d902e510d5f0efc6b08ea8593fb8d0396aec206a0126799552d5308a432a8c03544529e4a

  • memory/1252-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1252-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2040-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2040-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB