Analysis

  • max time kernel
    153s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 04:37

General

  • Target

    75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe

  • Size

    57KB

  • MD5

    65dbfe4dd8eb7c9b94bdae5b6d46bb67

  • SHA1

    86456512514d4f43ed930b6a8decad89b6639b3f

  • SHA256

    75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296

  • SHA512

    a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9

  • SSDEEP

    768:meNmfdOtRDlXaswgwIQnHwgsz87gmBwd29yAllpUa/HZpuLtd4ikI+byQeqd5x7L:meCd6RhXangwbImmd8yO3ZVvyQNGrvc

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe
    "C:\Users\Admin\AppData\Local\Temp\75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    57KB

    MD5

    65dbfe4dd8eb7c9b94bdae5b6d46bb67

    SHA1

    86456512514d4f43ed930b6a8decad89b6639b3f

    SHA256

    75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296

    SHA512

    a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9

  • C:\Windows\svchost.exe

    Filesize

    57KB

    MD5

    65dbfe4dd8eb7c9b94bdae5b6d46bb67

    SHA1

    86456512514d4f43ed930b6a8decad89b6639b3f

    SHA256

    75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296

    SHA512

    a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9

  • \Windows\SysWOW64\PDLL.dll

    Filesize

    106KB

    MD5

    6d8639481e7da863b32e5c0d06adeab0

    SHA1

    0213d960897560948d7e34ecab137ad170ed5329

    SHA256

    46edfedea9cdc3e35b138ca8b6fdd05e2a05413206ff4e89d405a9eb8dee18f3

    SHA512

    1df8d93c6c2c2a006bf7b740b193e1f6d57ed921663d59a20ffe98d5cea948f8f23856cce2d33ca72b5a9f7c7b3ca56c345922212fc1bd719bf3947ea86960a9

  • memory/1260-59-0x00000000002C0000-0x00000000002E0000-memory.dmp

    Filesize

    128KB

  • memory/1260-60-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1632-55-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB