Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 07:39

General

  • Target

    aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b.exe

  • Size

    484KB

  • MD5

    ac6b71abcb71f997af10d48897742e31

  • SHA1

    a9e33a13e9502e004aaa8d2a2c51845be8d0b91a

  • SHA256

    aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b

  • SHA512

    0617f1e4471e121de6548a3fc4e32d5d44782231d0a9b0b88fa91578a62baaf2e942c7e1e4e50e6ec8d5c20179a2fbdd100fb137e893bbd3d7d366fc4ca7bcd5

  • SSDEEP

    6144:oezaXW78iefMEUbEKi1mSI1c19sCzyApRI2Ff491eVHY:oW87EEUIv8S/++A91CH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b.exe
    "C:\Users\Admin\AppData\Local\Temp\aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\ebxNraYfaQsogLK.exe
      C:\Users\Admin\AppData\Local\Temp\aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      PID:936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\ebxNraYfaQsogLK.exe

    Filesize

    484KB

    MD5

    ac6b71abcb71f997af10d48897742e31

    SHA1

    a9e33a13e9502e004aaa8d2a2c51845be8d0b91a

    SHA256

    aaa11454c7bcb0990f913dcce90fa948b6463514650494fbe0702c0008edda2b

    SHA512

    0617f1e4471e121de6548a3fc4e32d5d44782231d0a9b0b88fa91578a62baaf2e942c7e1e4e50e6ec8d5c20179a2fbdd100fb137e893bbd3d7d366fc4ca7bcd5

  • memory/576-66-0x0000000000570000-0x00000000005A4000-memory.dmp

    Filesize

    208KB

  • memory/576-67-0x00000000005B0000-0x00000000005EA000-memory.dmp

    Filesize

    232KB

  • memory/576-69-0x00000000005B0000-0x00000000005EA000-memory.dmp

    Filesize

    232KB

  • memory/576-70-0x000007FEFB881000-0x000007FEFB883000-memory.dmp

    Filesize

    8KB

  • memory/936-65-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/936-68-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2040-54-0x00000000753F1000-0x00000000753F3000-memory.dmp

    Filesize

    8KB

  • memory/2040-55-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2040-56-0x0000000000401000-0x0000000000404000-memory.dmp

    Filesize

    12KB

  • memory/2040-60-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB