Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 18:55

General

  • Target

    a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61.exe

  • Size

    536KB

  • MD5

    0dcdc1a0b4a002c2c25c856db183b5f4

  • SHA1

    12ed6403d248f9b8f8a3aa89b396945a18e32b8a

  • SHA256

    a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61

  • SHA512

    f3eddb943bd31223283adf94373f60c36bfc0a0c0dd9920bd481d420805972d1945305d3a26779d17890e43025bccf88f5da8be54138e6d7f2af4d39efcdad09

  • SSDEEP

    12288:nXV9Hedhr6eecMwIsf8c2a7rGNrkty0fkhAlmvl:nXLHerxfIsf8c2aErmyFAel

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61.exe
    "C:\Users\Admin\AppData\Local\Temp\a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61.EXE
      "C:\Users\Admin\AppData\Local\Temp\a56a71568e2fae3cae4e7eab6acb227c82006ebd1cecfb1e008f0d9408878f61.EXE"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:828

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/828-57-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/828-62-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/828-63-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/896-56-0x0000000075E31000-0x0000000075E33000-memory.dmp

          Filesize

          8KB