Analysis

  • max time kernel
    150s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 01:28

General

  • Target

    7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe

  • Size

    44KB

  • MD5

    d74077fa9f63cdebdfae36b6fb01fabf

  • SHA1

    534a04bc2f7e98dd84885bcb56ac6ecfec180717

  • SHA256

    7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a

  • SHA512

    f43675db89d6ea2ff80cd51e70d61debffd030f8c1bb2a43d516842fda88365edb38051fa031d8f5855f09bfc6ae05a341359ef7ef84841cea4626de6adf5fbc

  • SSDEEP

    768:75TBRYoWYexSbfbqC2z56vcKuJKqyLohvMGC:7v+vzSjbJ2F/bJKqOBGC

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe
    "C:\Users\Admin\AppData\Local\Temp\7984d18a50cf809dc4dfc74974b3126343cd0ff3ba9cdd855e160589d0fd2c4a.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\regsvr32.exe
      C:\Windows\regsvr32.exe
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1488

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\OLE32Init.exe

          Filesize

          44KB

          MD5

          4f61b3708cf0b8324b923d36d2a4d369

          SHA1

          f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75

          SHA256

          0c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704

          SHA512

          4a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1

        • C:\Windows\regsvr32.exe

          Filesize

          44KB

          MD5

          4f61b3708cf0b8324b923d36d2a4d369

          SHA1

          f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75

          SHA256

          0c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704

          SHA512

          4a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1

        • C:\Windows\regsvr32.exe

          Filesize

          44KB

          MD5

          4f61b3708cf0b8324b923d36d2a4d369

          SHA1

          f16332b1e2e8dbf3b4f8c25ed5e539322f18ad75

          SHA256

          0c59ce192a97af4c9350ea1b7dcbb40ae55aa83537c82dec28e9d60d2691b704

          SHA512

          4a3ea9c318dc7e76e86c3bdc567a2755e1476a23e8014876c0417b016d8142bc817daa126c9b612311aebfc9f644bc81e590b909d07c743e46cd763c147c7af1

        • memory/1376-54-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1376-55-0x0000000075921000-0x0000000075923000-memory.dmp

          Filesize

          8KB

        • memory/1376-58-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1488-62-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB