Analysis

  • max time kernel
    145s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 09:13

General

  • Target

    0d378d35fc5d3b394c2536b057436e71eaf7b3c04091cd19ccee4caec6d45eb4.exe

  • Size

    776KB

  • MD5

    1eed7deefa60f321b325a22bf0a9841d

  • SHA1

    bc9b230f5a0120a9eb5971812e4c199b04f6da6c

  • SHA256

    0d378d35fc5d3b394c2536b057436e71eaf7b3c04091cd19ccee4caec6d45eb4

  • SHA512

    6f4f9297e376c28b532bd97c23f29d145f59bb9fbe1b9db17f9881b4585d789229e4543d344a5e4e593db6726ec647836c0d5daaebdd98fc49cf86863cfeeee7

  • SSDEEP

    24576:UsW/WNSZ8CLGETEjgXs4hDFqCLBkLuC4ATl:Up/HiCHbxhDMEOLutAJ

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d378d35fc5d3b394c2536b057436e71eaf7b3c04091cd19ccee4caec6d45eb4.exe
    "C:\Users\Admin\AppData\Local\Temp\0d378d35fc5d3b394c2536b057436e71eaf7b3c04091cd19ccee4caec6d45eb4.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Modifies registry class
      PID:1768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\spoolsv.exe

    Filesize

    780KB

    MD5

    dd48a7fde03ee3e5b7ac8f594fb89c34

    SHA1

    204b0484c8332fd6c9295314acd63de73c318ea5

    SHA256

    ad05d2c0bf5788e146410e94984e93687523fae921b46ab7094c8bc6dfe5212b

    SHA512

    a07420a3a33d75f17e771b9dd10b3a3d1d98e0ace24c7b0bd1ca39e622c96015c6130fdc70f063fa30427bbb1bdad10afb585ba06e46653870e26220b5c28adb

  • memory/1204-54-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1204-57-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1768-55-0x0000000000000000-mapping.dmp

  • memory/1768-58-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1768-59-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB