Analysis

  • max time kernel
    146s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 02:09

General

  • Target

    7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe

  • Size

    304KB

  • MD5

    10b9f58bc5186e251dd106b9a967dbf6

  • SHA1

    c091c0eaccd0a770b8df622cb3faf5b189e5fdcf

  • SHA256

    7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071

  • SHA512

    21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60

  • SSDEEP

    3072:JRj2d7pRRRMRRRb7HietvTss3XXD8Eq3GBsoeswwA/mdm04yKr7Td6:yp7eHtHEgD8Eq8E3Gm04yG

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
    "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:876
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • Modifies registry key
        PID:884
    • C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe
      "C:\Users\Admin\AppData\Local\Temp\7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1772
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1208
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1868
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1064
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\svchost.exe" /t REG_SZ /d "C:\Windows\svchost.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:1968
        • C:\Windows\svchost.exe
          "C:\Windows\svchost.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:280

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\svchost.exe

          Filesize

          304KB

          MD5

          10b9f58bc5186e251dd106b9a967dbf6

          SHA1

          c091c0eaccd0a770b8df622cb3faf5b189e5fdcf

          SHA256

          7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071

          SHA512

          21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60

        • C:\Windows\svchost.exe

          Filesize

          304KB

          MD5

          10b9f58bc5186e251dd106b9a967dbf6

          SHA1

          c091c0eaccd0a770b8df622cb3faf5b189e5fdcf

          SHA256

          7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071

          SHA512

          21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60

        • C:\Windows\svchost.exe

          Filesize

          304KB

          MD5

          10b9f58bc5186e251dd106b9a967dbf6

          SHA1

          c091c0eaccd0a770b8df622cb3faf5b189e5fdcf

          SHA256

          7eb4b2ff20637235069ef71e625a46665ffd695e35bb6716a0aaf51bd11e4071

          SHA512

          21c9c0cec68a4b0830e80a0e19aa3a0e3a934ea4d4daf7280d378e094b3311a747e62e4367b3abe7dc3a5184638ffdd8a49242726aaa7fdf352804bda637ef60

        • memory/280-106-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/280-105-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/748-76-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/748-54-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB

        • memory/1068-60-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-104-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-65-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-67-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-77-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-73-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-63-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-72-0x0000000074FB1000-0x0000000074FB3000-memory.dmp

          Filesize

          8KB

        • memory/1068-62-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-59-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1068-69-0x0000000000400000-0x000000000046E000-memory.dmp

          Filesize

          440KB

        • memory/1772-103-0x0000000000400000-0x0000000000451000-memory.dmp

          Filesize

          324KB