Analysis

  • max time kernel
    186s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 01:52

General

  • Target

    0cb6942c708bc43c4048d9154fbaedb68868fe6f48a81c01e955a8df7cb94272.exe

  • Size

    243KB

  • MD5

    81a3bdeb97df4d19f71be40a7eb3bbc6

  • SHA1

    a523f66a98710dc9a74300299d175bab9623c5c2

  • SHA256

    0cb6942c708bc43c4048d9154fbaedb68868fe6f48a81c01e955a8df7cb94272

  • SHA512

    756792c650a6561d9e9a1483fd4f4377ba08510a42d7e6fdc0b4c722ba4a7ddda23b20877183d9d54bf9b9785691c5cf923d70ab87dc0f617d4a657df97a2e8b

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuft0Mt+til+XDVLCdrt1NpTX:UsAAPF0Mt+Il+zgdrtzd

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cb6942c708bc43c4048d9154fbaedb68868fe6f48a81c01e955a8df7cb94272.exe
    "C:\Users\Admin\AppData\Local\Temp\0cb6942c708bc43c4048d9154fbaedb68868fe6f48a81c01e955a8df7cb94272.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    246KB

    MD5

    ab9110f706ab0a5ed3be9d9902927fa3

    SHA1

    8595c6487adbc4806ded177ce296ef7704ddba7e

    SHA256

    bd17605ff8a7d956a58d1d1c8dc274f6b9a31ef7d9d00b1f25b627d9e43c9c66

    SHA512

    b9a2d8b72f326e3e0bdf14c6c6c0f976a0b5165ff72449d087c2610129c4fc760f40c74d5c6cc1cc5c6a93c24b745adf96a1cedd8a295b773112610793f6bc44

  • memory/560-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/560-56-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1116-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1116-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB