Analysis

  • max time kernel
    160s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 09:02

General

  • Target

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967.exe

  • Size

    52KB

  • MD5

    41f83a2522a774e9d24c529121dca3b0

  • SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

  • SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

  • SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • SSDEEP

    768:iMJDmX0vMs3i6EJnXPUWPYf4c/AS3qERQpTn3tOn:vIX23i6ExX1bOEp2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967.exe
    "C:\Users\Admin\AppData\Local\Temp\6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\REG.exe
      REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinShell /t REG_SZ /d C:\WinShell\WinSeven.exe /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:1700
    • C:\WinShell\WinSeven.exe
      C:\WinShell\WinSeven.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Windows\SysWOW64\REG.exe
        REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v WinShell /t REG_SZ /d C:\WinShell\WinSeven.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\taskhost.exe

    Filesize

    52KB

    MD5

    41f83a2522a774e9d24c529121dca3b0

    SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

    SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

    SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • C:\WinShell\WinSeven.exe

    Filesize

    52KB

    MD5

    41f83a2522a774e9d24c529121dca3b0

    SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

    SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

    SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • C:\WinShell\WinSeven.exe

    Filesize

    52KB

    MD5

    41f83a2522a774e9d24c529121dca3b0

    SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

    SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

    SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • \WinShell\WinSeven.exe

    Filesize

    52KB

    MD5

    41f83a2522a774e9d24c529121dca3b0

    SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

    SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

    SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • \WinShell\WinSeven.exe

    Filesize

    52KB

    MD5

    41f83a2522a774e9d24c529121dca3b0

    SHA1

    e9533ca6cdb6232f5e63fb8df4ef3d9f0a2b7596

    SHA256

    6ea05f70451fd67d148800d867e07ab9dab628f365971c4474990c856a170967

    SHA512

    30d3a6d83ccbddebc2341fc33b8962e883b7c1f5a9feda4f7482460d5446c35fedfb859af2ee08d2ca303fe47d4c89284ad9561b4096e7e94420c3717b923c99

  • memory/484-59-0x0000000000000000-mapping.dmp

  • memory/860-57-0x0000000000000000-mapping.dmp

  • memory/1700-54-0x0000000000000000-mapping.dmp