Analysis

  • max time kernel
    284s
  • max time network
    381s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:37

General

  • Target

    5a8f482899c2d41a44581b510027486819aeee64cb00216fec45382d831ce25a.exe

  • Size

    63KB

  • MD5

    cf39e701c001550cd29aecce9b003fc9

  • SHA1

    04db2207181ae9e5362cfe99a76b7e11c3bdfa4d

  • SHA256

    5a8f482899c2d41a44581b510027486819aeee64cb00216fec45382d831ce25a

  • SHA512

    0c422a9a146bc352d2c22dc73ed7dfd3601e50f640eb23f767d9875eac0f09bd93cf25577d11b56cd7e96bb8a4cdbbe53e817c98663ad40f69314897c71eff43

  • SSDEEP

    768:4KPGlWqbiy0e0MhZ54JDT10HrJj0R19R28xdoa7FHVjYPqm0cdZUoZTlFJFsN1mm:QNGy0ahZ54cHrJjWz28xdFuTUNaZj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a8f482899c2d41a44581b510027486819aeee64cb00216fec45382d831ce25a.exe
    "C:\Users\Admin\AppData\Local\Temp\5a8f482899c2d41a44581b510027486819aeee64cb00216fec45382d831ce25a.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1532
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:388
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:1116

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/388-59-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

      Filesize

      8KB

    • memory/1284-57-0x0000000076D60000-0x0000000076F09000-memory.dmp

      Filesize

      1.7MB

    • memory/1284-58-0x0000000002A10000-0x0000000002A18000-memory.dmp

      Filesize

      32KB

    • memory/1284-60-0x0000000076D60000-0x0000000076F09000-memory.dmp

      Filesize

      1.7MB

    • memory/1532-54-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/1532-55-0x0000000000220000-0x0000000000239000-memory.dmp

      Filesize

      100KB

    • memory/1532-56-0x0000000000220000-0x0000000000239000-memory.dmp

      Filesize

      100KB