Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 00:18

General

  • Target

    b96927416e011a97ede2ec13f8bb6fcc4f977a93e9748e1cd8edbe05d86f9a99.exe

  • Size

    29KB

  • MD5

    a496f252a4a49fdc46442297f681cdb3

  • SHA1

    6e8a13947c218e6430f7e7390c9b76281fc6a13b

  • SHA256

    b96927416e011a97ede2ec13f8bb6fcc4f977a93e9748e1cd8edbe05d86f9a99

  • SHA512

    a5cd2287abd51b795efa710adf4e459fd6e657e0031c30192990a18e4109b06cdf1415c5d8f29f5240655c4dec1f16e42138ebd1324e77b0560a6269320029be

  • SSDEEP

    768:+8ZsubRZklBYPt+XQoiUVLnbcuyD7UWml:zZsWRZklBKVU1nouy8Bl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b96927416e011a97ede2ec13f8bb6fcc4f977a93e9748e1cd8edbe05d86f9a99.exe
    "C:\Users\Admin\AppData\Local\Temp\b96927416e011a97ede2ec13f8bb6fcc4f977a93e9748e1cd8edbe05d86f9a99.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\7109620.DLL

    Filesize

    12.1MB

    MD5

    db3afea4a54789ed27acb9e8d4bc3ddd

    SHA1

    443406d7b43151cc8b3b1230beee4a7d46dc33e4

    SHA256

    06be1c7c2f8fa0d4d3fefa56a4a545c26d7f2037ba85305b4acd5e32758678a5

    SHA512

    827469524bf6bfbae1241bbbc34dc0ad58bd7128fd872083ee2df49b1270f482c3e140959a3fb80e8f5e25211eb168bf31b21fdcf400d0308f7f262b6fba9f18

  • memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/1452-55-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB