Analysis

  • max time kernel
    187s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 23:29

General

  • Target

    ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe

  • Size

    386KB

  • MD5

    947821e64b0be77814225551bece1717

  • SHA1

    8133b2cb60c1f1b75e1a577094ccc2a91ada3c11

  • SHA256

    ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a

  • SHA512

    172e64b4f66f9d70df4d259454005f59855c00e9a6b593be13696fb36b48323f97e483e4719151c33313482746795281051dd875956386dde95ab04c9ee06dc5

  • SSDEEP

    12288:j7+v450hrIIEGpzK6FSkFv7adt7VRmc56RX:DmB5pzv8XRmc5mX

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe
    "C:\Users\Admin\AppData\Local\Temp\ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Bat_f_i_l_e_tmp.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Windows\SysWOW64\regsvr32.exe
        C:\Windows\system32\regsvr32 /u /s C:\Windows\system32\shana.dll
        3⤵
          PID:556

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\Bat_f_i_l_e_tmp.bat

            Filesize

            94B

            MD5

            80441fe0882f8727fdcdb4e60426f362

            SHA1

            fd3914439560a54c2657a9f09d22254e15a17421

            SHA256

            fbf25e03b128620ae2deb2e663b5715719c485872c0c253678d52613d2644c9e

            SHA512

            0dbe796e9fdcbd993ce66b049a98b7a2aceb312740747657ed8749c6a37b84ccea198ba002249fe127bf84b2553f5483e54be592546da5bf9609bd99aa5a3a78

          • memory/556-59-0x0000000075D61000-0x0000000075D63000-memory.dmp

            Filesize

            8KB

          • memory/1776-54-0x0000000000400000-0x000000000046A000-memory.dmp

            Filesize

            424KB

          • memory/1776-55-0x0000000000350000-0x00000000003AA000-memory.dmp

            Filesize

            360KB

          • memory/1776-60-0x0000000000400000-0x000000000046A000-memory.dmp

            Filesize

            424KB