Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 16:28

General

  • Target

    da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe

  • Size

    334KB

  • MD5

    bbffe40abd328fb813488525582a739c

  • SHA1

    e2d911da1f333a890224f5a2a64ff2519ffcd62c

  • SHA256

    da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac

  • SHA512

    6b37392fbdfff463aca6e58a83cbaf7a7da4dddebe09fb0f442e503cda1a3d1c6501e054c6b6c921d1bcfa5bf41f3be9d0ed87cbceec51fe85bd113bf74020b5

  • SSDEEP

    6144:P8hbjRDRuvYSggJCsiQbFzjRLdQPanA9fcW7DWaF:P8qYlcCVQbVjNK7/7DWaF

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 5 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
    "C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
      "C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Windows\SysWOW64\calc.exe
        "C:\Windows\SysWOW64\calc.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Windows\SysWOW64\notepad.exe
          "C:\Windows\SysWOW64\notepad.exe"
          4⤵
            PID:1400
      • C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe
        "C:\Users\Admin\AppData\Local\Temp\da3579010191adc0aa1bdc287fbb338d9c4aea5b0ce39bb4f8af3d27bfc097ac.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          3⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/260-97-0x0000000000110000-0x0000000000115000-memory.dmp

      Filesize

      20KB

    • memory/296-112-0x0000000000B60000-0x0000000000B65000-memory.dmp

      Filesize

      20KB

    • memory/336-99-0x0000000001F00000-0x0000000001F05000-memory.dmp

      Filesize

      20KB

    • memory/372-100-0x0000000000250000-0x0000000000255000-memory.dmp

      Filesize

      20KB

    • memory/384-101-0x0000000000490000-0x0000000000495000-memory.dmp

      Filesize

      20KB

    • memory/420-102-0x0000000000050000-0x0000000000055000-memory.dmp

      Filesize

      20KB

    • memory/468-103-0x0000000000180000-0x0000000000185000-memory.dmp

      Filesize

      20KB

    • memory/476-104-0x0000000000190000-0x0000000000195000-memory.dmp

      Filesize

      20KB

    • memory/484-105-0x0000000000100000-0x0000000000105000-memory.dmp

      Filesize

      20KB

    • memory/600-106-0x0000000000520000-0x0000000000525000-memory.dmp

      Filesize

      20KB

    • memory/676-107-0x00000000003C0000-0x00000000003C5000-memory.dmp

      Filesize

      20KB

    • memory/760-108-0x0000000000900000-0x0000000000905000-memory.dmp

      Filesize

      20KB

    • memory/816-109-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/856-110-0x00000000006A0000-0x00000000006A5000-memory.dmp

      Filesize

      20KB

    • memory/880-111-0x00000000009F0000-0x00000000009F5000-memory.dmp

      Filesize

      20KB

    • memory/956-135-0x00000000000C0000-0x00000000000D0000-memory.dmp

      Filesize

      64KB

    • memory/956-123-0x00000000000C0000-0x00000000000D0000-memory.dmp

      Filesize

      64KB

    • memory/956-124-0x0000000000020000-0x0000000000025000-memory.dmp

      Filesize

      20KB

    • memory/956-92-0x0000000000000000-mapping.dmp

    • memory/1028-115-0x0000000000190000-0x0000000000195000-memory.dmp

      Filesize

      20KB

    • memory/1076-116-0x0000000000090000-0x0000000000095000-memory.dmp

      Filesize

      20KB

    • memory/1132-113-0x0000000000210000-0x0000000000215000-memory.dmp

      Filesize

      20KB

    • memory/1184-118-0x0000000000330000-0x0000000000335000-memory.dmp

      Filesize

      20KB

    • memory/1224-114-0x0000000002190000-0x0000000002195000-memory.dmp

      Filesize

      20KB

    • memory/1252-121-0x0000000000120000-0x0000000000125000-memory.dmp

      Filesize

      20KB

    • memory/1400-134-0x0000000000080000-0x0000000000090000-memory.dmp

      Filesize

      64KB

    • memory/1400-132-0x0000000000000000-mapping.dmp

    • memory/1488-80-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-72-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-69-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-74-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-88-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-76-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-68-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-77-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-86-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/1488-81-0x0000000000415EBC-mapping.dmp

    • memory/1632-119-0x00000000007E0000-0x00000000007E5000-memory.dmp

      Filesize

      20KB

    • memory/1664-89-0x0000000000000000-mapping.dmp

    • memory/1664-98-0x00000000005A0000-0x00000000005A8000-memory.dmp

      Filesize

      32KB

    • memory/1664-95-0x0000000010000000-0x0000000010019000-memory.dmp

      Filesize

      100KB

    • memory/1664-120-0x0000000002160000-0x0000000002324000-memory.dmp

      Filesize

      1.8MB

    • memory/1664-96-0x00000000001A0000-0x00000000001A5000-memory.dmp

      Filesize

      20KB

    • memory/1908-122-0x0000000000100000-0x0000000000105000-memory.dmp

      Filesize

      20KB

    • memory/1956-87-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-65-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-56-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-55-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-60-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-62-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-64-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-58-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-78-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/1956-66-0x0000000000403850-mapping.dmp

    • memory/2000-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

      Filesize

      8KB

    • memory/2000-84-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/2000-83-0x0000000000300000-0x0000000000343000-memory.dmp

      Filesize

      268KB

    • memory/2020-117-0x0000000000100000-0x0000000000105000-memory.dmp

      Filesize

      20KB