Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 15:35

General

  • Target

    cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8.exe

  • Size

    10KB

  • MD5

    43c3ef09e1f580efdc5d33591d4da8b2

  • SHA1

    e6c3138e4467c1bf82bd14947d6d883b8693d08f

  • SHA256

    cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8

  • SHA512

    8a4523ea51878d48814452c635ccb017cc9c133c5372bedc73d2c86b9e59f296d49fc6ca678b18ac15d864dad35db56d67b38b9e5338a33ffcf493d43c0825d7

  • SSDEEP

    192:nbiqIXsP18touF3lcfFf5yqG1HLSX9A0:biqis9Qlcffyq+ef

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8.exe
        "C:\Users\Admin\AppData\Local\Temp\cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Local\Temp\cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8.exe
          "C:\Users\Admin\AppData\Local\Temp\cac7f8ec6eacffa47e4b797e547a20ddebb1f0553d94bc6971b70ff24160b0d8.exe"
          3⤵
            PID:544

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1260-55-0x00000000021E0000-0x00000000021E1000-memory.dmp

        Filesize

        4KB