Analysis

  • max time kernel
    147s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2022, 01:55

General

  • Target

    915a6e05e82eea33496856ebea2782a618f15b26265901af367e889549806f82.exe

  • Size

    668KB

  • MD5

    db4b51666e84c5dfa8ceff0f508ea9f4

  • SHA1

    faf044d636169400b48819f547bbcc237feb30a2

  • SHA256

    915a6e05e82eea33496856ebea2782a618f15b26265901af367e889549806f82

  • SHA512

    e0fd7aec230e9b9f8effb32b8fdf09869186b666a3a573d0fc20892bdbc7b153db04dcedd93c7bc67c9f5abd620423368e6a26aae14b4ae125d0162baa93f077

  • SSDEEP

    12288:UsAAPaPUD18t/R/OgRs6dBFnD0YvK2CSzfCoJ6BvlJO002TlLxq2YWb3t:UsMP7tMEs6dfoYvZfRJ0vlJx0kpA2Yqd

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\915a6e05e82eea33496856ebea2782a618f15b26265901af367e889549806f82.exe
    "C:\Users\Admin\AppData\Local\Temp\915a6e05e82eea33496856ebea2782a618f15b26265901af367e889549806f82.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    671KB

    MD5

    7c068bf76e1ebf8bcb1ab9164136b2ab

    SHA1

    48fd0907487a81dae376004363edbd0eaeb2a73f

    SHA256

    c5ebff13e9dda514587fcc87246d089a2db94bbf3175a935de60fd72cb6fe419

    SHA512

    39f31d1a1e4894703894b5fbd2fe3758e81fb7d10a16eb71899be0bdbe07e3d3e84c41bfc0ef064555718e125ea466a04be41c46c29da1b208b40af15741a734

  • memory/1932-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1932-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1940-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1940-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB