Analysis

  • max time kernel
    151s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 07:33

General

  • Target

    0285b5318947cf41164de638ba69ed40c3bf7576ddfd377863cc55e6d69b72bc.exe

  • Size

    164KB

  • MD5

    4ab28946235b0d140307652c1fa752ec

  • SHA1

    24fe356a099fca618397459eef4d89d0db40d825

  • SHA256

    0285b5318947cf41164de638ba69ed40c3bf7576ddfd377863cc55e6d69b72bc

  • SHA512

    0f4bc83b489d8d92dd545342afd3d95da3e57abda1dab6e9153d42ad52a31b0177d8089421dceb9d5eaa78b9af3918aade1de58308fff1d21ad3b0c3e48de13c

  • SSDEEP

    768:UYTT7+loPqflLmdylzq5nO4rGQzTGfmgc33emu4v/eo4z7VP7LdGSu2HyTAzfMg3:vn7xgmUFZQVgd54vG

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0285b5318947cf41164de638ba69ed40c3bf7576ddfd377863cc55e6d69b72bc.exe
    "C:\Users\Admin\AppData\Local\Temp\0285b5318947cf41164de638ba69ed40c3bf7576ddfd377863cc55e6d69b72bc.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Windows\SysWOW64\Explorer.exe
      Explorer
      2⤵
        PID:892

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/892-57-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

      Filesize

      8KB

    • memory/892-59-0x0000000075211000-0x0000000075213000-memory.dmp

      Filesize

      8KB

    • memory/936-58-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/936-60-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB