Analysis

  • max time kernel
    144s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 08:27

General

  • Target

    ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce.exe

  • Size

    112KB

  • MD5

    d32c41307f894359c518565c3beece7c

  • SHA1

    8774d311aec925856d36e9c4382a4e13c66938e5

  • SHA256

    ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce

  • SHA512

    c2812f70e643cd40ce64f663cea3e1d699fe113d3a909bac05b4786ac2f447f0e9f4e32f0c56206985d3fc239f2e99d96397684a11a4ef5f2a89eb3442da9a6c

  • SSDEEP

    1536:Rq2rj11bzDR+jeZw5zX0vCGhNhe2loYOXjuDlLN1+wdElArfSar7lqABVVn7/9ox:Y2PR+Kw57wNbT/giZrfSapv9zHa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce.exe
        "C:\Users\Admin\AppData\Local\Temp\ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1228
        • C:\Users\Admin\AppData\Local\Temp\ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce.exe
          "C:\Users\Admin\AppData\Local\Temp\ee7438f7d8d4bf23038c163886d7f0a2f81cad52e590a78cc5efd39d68826fce.exe"
          3⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: RenamesItself
          • Suspicious use of WriteProcessMemory
          PID:1216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1216-56-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-57-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-59-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-61-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-62-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-63-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-64-0x000000000040114A-mapping.dmp

    • memory/1216-66-0x00000000760A1000-0x00000000760A3000-memory.dmp

      Filesize

      8KB

    • memory/1216-67-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/1216-71-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB