Analysis

  • max time kernel
    70s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 22:57

General

  • Target

    f9de4765a093fe8efe6909d64040176035dbcb7910747840d7cd59448ce96cbe.exe

  • Size

    113KB

  • MD5

    0270e70c6cc000d82cc3cc93a6c9d8c9

  • SHA1

    c25328ec427ca2c318c0265bbf0baeb19b9d40fe

  • SHA256

    f9de4765a093fe8efe6909d64040176035dbcb7910747840d7cd59448ce96cbe

  • SHA512

    2f8849c8c113a0657af79d77fca77245ed674222a30928c0f528e6f1956990b454cfed91dc707566322f654e1462abd206d45d4fcd64e5e2c717cbbc2c77ffd6

  • SSDEEP

    3072:/y3xG9uGQVwuWmWg9+P3to8VGIoInBGbLMHMb9/x1e:KhG9uGju9tcPdzSIAnF9J8

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9de4765a093fe8efe6909d64040176035dbcb7910747840d7cd59448ce96cbe.exe
    "C:\Users\Admin\AppData\Local\Temp\f9de4765a093fe8efe6909d64040176035dbcb7910747840d7cd59448ce96cbe.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:936

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/936-54-0x0000000075A81000-0x0000000075A83000-memory.dmp

          Filesize

          8KB