Analysis

  • max time kernel
    144s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 23:34

General

  • Target

    121d77f3800026a8bfcd1cdc417e4212244217cb290b3e99f0e6063be23f3fbf.exe

  • Size

    867KB

  • MD5

    003b9e0df4d8f94a3f6ce035a53d2d32

  • SHA1

    3bfe7cacbd6290980df6f8f9b75f969923a80370

  • SHA256

    121d77f3800026a8bfcd1cdc417e4212244217cb290b3e99f0e6063be23f3fbf

  • SHA512

    4d3e575fbe88b4807dce832c8c22942834d55b6091f298b2f9f3aa361f0b80f4e56367e6e98f6bfd63e51dd763b04cf3dece722d710899d7353de413d7fdb334

  • SSDEEP

    24576:UsBbWOSY4HewnvFdjaKDDh694uYkLD20PEiCVMx:UqL4BnvXjF0HYyD2Z2

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\121d77f3800026a8bfcd1cdc417e4212244217cb290b3e99f0e6063be23f3fbf.exe
    "C:\Users\Admin\AppData\Local\Temp\121d77f3800026a8bfcd1cdc417e4212244217cb290b3e99f0e6063be23f3fbf.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    871KB

    MD5

    8595a920835c6f4cd19ee404058ba46f

    SHA1

    cd38f21f478bda8c14f9838e6a1059d31d534c3a

    SHA256

    20645111829c2fbdd017a52c6133d8cbcab69c81f708ab68e5f6f1ff0dfd4e98

    SHA512

    ddf3c7ad733dba583fc9e70892a80f3c9859630c5996d33e39438b966ebe63ddf07fdec79a8e4187c137862f436709d1e1fdebd2c97ceb210c8d812853b22ef1

  • memory/988-55-0x0000000000000000-mapping.dmp

  • memory/988-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/988-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2032-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2032-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB