Analysis

  • max time kernel
    153s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 21:16

General

  • Target

    8682ede348acbf0dc4fcc76b9b3034704421d47e597c4f683fbbcbcf5022a78a.exe

  • Size

    488KB

  • MD5

    c34c87e4afe9628557ba9d7f86e7a25a

  • SHA1

    c8d303a2f4d361d13b30035a14d12f56814d82b1

  • SHA256

    8682ede348acbf0dc4fcc76b9b3034704421d47e597c4f683fbbcbcf5022a78a

  • SHA512

    dfe762e6b1bfcc7ded724429197e4201089b56dd7470ff73e6f3e79fab1d50692d0704446fe30470843b8827328eb4752aca93712f6ea71a11282eaabb36212a

  • SSDEEP

    12288:7uo44C+sf08Um+/qrp/jrSB2QiIG6CzTnTH3x2PViSCv8MfSdaNPRWP:yo44C+sf08Um+/qrp/jrSB2QiIG6CzTO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8682ede348acbf0dc4fcc76b9b3034704421d47e597c4f683fbbcbcf5022a78a.exe
    "C:\Users\Admin\AppData\Local\Temp\8682ede348acbf0dc4fcc76b9b3034704421d47e597c4f683fbbcbcf5022a78a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\system\msnmsg.exe
      C:\Windows\system\msnmsg.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1776

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bmp2Jpeg.dll

    Filesize

    181KB

    MD5

    79a23aaad184e3fbc407cb41daa2e360

    SHA1

    ed3039a162d4f1cce7dab4c41b5a82ac5982e26b

    SHA256

    5ed0ed19a158205ffb8bf2474ba3895e33f3db1318cfcda181f41b8fd432b7d6

    SHA512

    d3a4bc584cb9850ae4e27520e614df19bad95b1b9cc612efded955b0abb8fe881a87d0b030f9d3d26c7b87a8449ee527ea156e68ac47395dbbb090e949351467

  • C:\Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • C:\Windows\system\msnmsg.exe

    Filesize

    488KB

    MD5

    dfb02ebf1b1245e534d3c4479596a004

    SHA1

    393bbbd0c4fb9218fa6bd6dd4d9d87a53ee0ad89

    SHA256

    7aeb277da73819e66aa3340d02d4283c2f112ed2def92f89d61b764e404c3ed9

    SHA512

    1b7b82eb774d64d6746ea0ebad779741b1b3aff828d645987b20ba6ec3c34c9960cd783055ad31c141ffdbfab50d6b65a2f0752e7bd0ec5a075f7118f01e4ebe

  • \Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • \Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • \Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • \Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • \Windows\SysWOW64\MSWINSCK.ocx

    Filesize

    106KB

    MD5

    3d8fd62d17a44221e07d5c535950449b

    SHA1

    6c9d2ecdd7c2d1b9660d342e2b95a82229486d27

    SHA256

    eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09

    SHA512

    501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10

  • \Windows\system\msnmsg.exe

    Filesize

    488KB

    MD5

    dfb02ebf1b1245e534d3c4479596a004

    SHA1

    393bbbd0c4fb9218fa6bd6dd4d9d87a53ee0ad89

    SHA256

    7aeb277da73819e66aa3340d02d4283c2f112ed2def92f89d61b764e404c3ed9

    SHA512

    1b7b82eb774d64d6746ea0ebad779741b1b3aff828d645987b20ba6ec3c34c9960cd783055ad31c141ffdbfab50d6b65a2f0752e7bd0ec5a075f7118f01e4ebe

  • \Windows\system\msnmsg.exe

    Filesize

    488KB

    MD5

    dfb02ebf1b1245e534d3c4479596a004

    SHA1

    393bbbd0c4fb9218fa6bd6dd4d9d87a53ee0ad89

    SHA256

    7aeb277da73819e66aa3340d02d4283c2f112ed2def92f89d61b764e404c3ed9

    SHA512

    1b7b82eb774d64d6746ea0ebad779741b1b3aff828d645987b20ba6ec3c34c9960cd783055ad31c141ffdbfab50d6b65a2f0752e7bd0ec5a075f7118f01e4ebe