Analysis

  • max time kernel
    91s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 18:54

General

  • Target

    4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe

  • Size

    65KB

  • MD5

    03f736672d601647f23cbc669fd7fb00

  • SHA1

    41def8dde9dfd38ed7659c65764da123057a909b

  • SHA256

    4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511

  • SHA512

    59c8fb9275ab3467b525bad493239955641f79392bbf49f84c91c1abd1f6eaa2b51480e245fbf542fb86be782558042ab2611dec25972c57e3bf07dbfab802dc

  • SSDEEP

    1536:J+zyufCGyoBKvalBCRpZuQWGz7+MujWod:J+VhyoBK3zStd

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe
    "C:\Users\Admin\AppData\Local\Temp\4c1123252908621c07cb2f6909f52afd7dd1c9ba632807617819ac937f319511.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:960
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/956-61-0x0000000075591000-0x0000000075593000-memory.dmp

    Filesize

    8KB

  • memory/960-55-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/960-54-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/960-56-0x0000000000250000-0x0000000000269000-memory.dmp

    Filesize

    100KB

  • memory/960-57-0x0000000000250000-0x0000000000269000-memory.dmp

    Filesize

    100KB

  • memory/1312-58-0x0000000077270000-0x0000000077419000-memory.dmp

    Filesize

    1.7MB

  • memory/1312-59-0x00000000029C0000-0x00000000029C8000-memory.dmp

    Filesize

    32KB

  • memory/1312-60-0x0000000077270000-0x0000000077419000-memory.dmp

    Filesize

    1.7MB