Analysis

  • max time kernel
    152s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2022 03:09

General

  • Target

    ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe

  • Size

    58KB

  • MD5

    1706bc9b94a4eedd040d24e07909a3f0

  • SHA1

    97735129e341c8bc23f1e0e2c436b1053811b7d5

  • SHA256

    ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f

  • SHA512

    3214bbbb299eeae25b502f9cd1e326ab0dd9733da9ac65febe4a44c4480e33bc465553013086d51ae6a409f485abe787be25cbe2f38c6cde8510e5e0fe3cea46

  • SSDEEP

    1536:pM4WXwX8Cfst3awkwFMerjcTtUm2fA9VpSuC6ARUx90w2:pM588CrweefcBJ2IdSuC690w

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe
    "C:\Users\Admin\AppData\Local\Temp\ec52e07050bd8f4b2e181dfbd2bc608ba9fdd446f2d58529bbc26dbd08594d0f.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1760
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:604
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:1872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1296-60-0x00000000021E0000-0x00000000021E8000-memory.dmp

      Filesize

      32KB

    • memory/1296-59-0x00000000776B0000-0x0000000077859000-memory.dmp

      Filesize

      1.7MB

    • memory/1296-62-0x00000000776B0000-0x0000000077859000-memory.dmp

      Filesize

      1.7MB

    • memory/1760-54-0x0000000075531000-0x0000000075533000-memory.dmp

      Filesize

      8KB

    • memory/1760-56-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1760-55-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1760-57-0x00000000002B0000-0x00000000002C9000-memory.dmp

      Filesize

      100KB

    • memory/1760-58-0x00000000002B0000-0x00000000002C9000-memory.dmp

      Filesize

      100KB