Analysis

  • max time kernel
    152s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2022 01:08

General

  • Target

    b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe

  • Size

    148KB

  • MD5

    7b70334ddda675512efc3eff1bb9fc6e

  • SHA1

    ba1a09b14bb6599821e453be97f326d03a153ee2

  • SHA256

    b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a

  • SHA512

    275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292

  • SSDEEP

    3072:RNYD0o7ELVWeIrnt/Jb03S8Me2lqO7Z/n18wzA0HFIy:UYueIrndei82nh18wsi

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe
    "C:\Users\Admin\AppData\Local\Temp\b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\Etufya.exe
      C:\Windows\Etufya.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:5040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Etufya.exe

    Filesize

    148KB

    MD5

    7b70334ddda675512efc3eff1bb9fc6e

    SHA1

    ba1a09b14bb6599821e453be97f326d03a153ee2

    SHA256

    b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a

    SHA512

    275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292

  • C:\Windows\Etufya.exe

    Filesize

    148KB

    MD5

    7b70334ddda675512efc3eff1bb9fc6e

    SHA1

    ba1a09b14bb6599821e453be97f326d03a153ee2

    SHA256

    b325b973ea7f4f5312f33699a38d48b38d479099bf894747879922eb045f8d0a

    SHA512

    275ad9c7e5de0383a61f0eaf114e5aee523672a635bbe26ece18fab9e439087e5aa422fc9c0e97c3f5bae8b1f0df5582040d9b6694dc8e8e7923ed7d04303292

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    426B

    MD5

    c03b016032db97cd62ed3685b2f1e63e

    SHA1

    61e8b7c13b39bf7d27b5c89f8b306b48f56640d3

    SHA256

    2ba75c66cb5934d437c1a00a5cb5519cd0464bf664f7bab47d4628cc29b6ff4c

    SHA512

    920a22d5e9ed37d46e50830f23fb4c671e2e7aed68f1080b7e931ff073c92b1bf4660b6d97a5ad4f5842bd78fb4ebe8bf9da9e1dd054f78a59a53ff0f0153acc

  • memory/4572-132-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4572-133-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/4572-140-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5040-138-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5040-139-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB