Analysis

  • max time kernel
    44s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 23:38

General

  • Target

    59af32eb2fd290309c4edffd8c750c3afc013b64aebe04bfcf8ea9187570f0ae.exe

  • Size

    206KB

  • MD5

    fe29e91e5be720844d9e03fce1f102f1

  • SHA1

    6392f757b192d9c1039edec09e235e61afc49692

  • SHA256

    59af32eb2fd290309c4edffd8c750c3afc013b64aebe04bfcf8ea9187570f0ae

  • SHA512

    77f63fe2bdedb1e9468f5fc24aa3014c891faa84fec05a177e8d884afc591e2b6450f3460dedd64d252e63c078d03a49934fde8dfc85fd9c82702b41128041eb

  • SSDEEP

    3072:ke/S8NtgzZVNK04mCmBKIQKcqcxQsyQ321Agq4i6b+Zlx:kIy97CmBKIQDqcxQrQmjJiF

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59af32eb2fd290309c4edffd8c750c3afc013b64aebe04bfcf8ea9187570f0ae.exe
    "C:\Users\Admin\AppData\Local\Temp\59af32eb2fd290309c4edffd8c750c3afc013b64aebe04bfcf8ea9187570f0ae.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\reg.exe
      reg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{72B12621-DB1A-AC15-2D7C-6566BFBB1E96}" /f
      2⤵
        PID:1160
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\1.bat
        2⤵
        • Deletes itself
        PID:1916

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\1.bat

            Filesize

            130B

            MD5

            8071f37c8d482b973e004c9c32415c68

            SHA1

            b21f80f5eea054cd39e7fd83c115625f0bdca3e3

            SHA256

            447560cc3b346182e031a1b6e73c2fa928460f6d089aa566999dca71ad683564

            SHA512

            5111e908beea3c4b5f310d2383e4529fe0ec8df393f9fc6fe4a06a47e73ca7ce4787f45583082932591697f6f283396c22fd285e5552d821381c48a7d8672ec7

          • memory/1292-55-0x00000000762E1000-0x00000000762E3000-memory.dmp

            Filesize

            8KB