Analysis

  • max time kernel
    154s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 07:32

General

  • Target

    779321e4ebfec1a97a36607cbe9a8b0c3bf5ca71ee27a107482408073bd9addd.exe

  • Size

    98KB

  • MD5

    4a1e23f92714a0a3b49d57483108a2c0

  • SHA1

    d89e49d30cf60cd4c70a1f508df55b74fe044ded

  • SHA256

    779321e4ebfec1a97a36607cbe9a8b0c3bf5ca71ee27a107482408073bd9addd

  • SHA512

    23190b5a5ef75a2be104d8ade8edb001ce16558264dade0d12c865d8efdbc306d29b59d00869297480fa79126c96d6e3b7e4728c74fde7c3ada1fef43549469d

  • SSDEEP

    1536:NRE+mYnqTva2Un6JQmbDv3cE8iYJoO2/UoCFOOAT+HVhQQ:5mYCa2YgccYthbONT+3

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\779321e4ebfec1a97a36607cbe9a8b0c3bf5ca71ee27a107482408073bd9addd.exe
    "C:\Users\Admin\AppData\Local\Temp\779321e4ebfec1a97a36607cbe9a8b0c3bf5ca71ee27a107482408073bd9addd.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1912
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:964

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/964-61-0x0000000000000000-mapping.dmp

    • memory/1256-58-0x0000000077160000-0x0000000077309000-memory.dmp

      Filesize

      1.7MB

    • memory/1256-60-0x0000000002A00000-0x0000000002A08000-memory.dmp

      Filesize

      32KB

    • memory/1912-54-0x0000000076041000-0x0000000076043000-memory.dmp

      Filesize

      8KB

    • memory/1912-55-0x0000000000400000-0x000000000041E000-memory.dmp

      Filesize

      120KB

    • memory/1912-56-0x00000000002A0000-0x00000000002B9000-memory.dmp

      Filesize

      100KB

    • memory/1912-57-0x00000000002A0000-0x00000000002B9000-memory.dmp

      Filesize

      100KB