Analysis

  • max time kernel
    142s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 03:54 UTC

General

  • Target

    ed722c39067548d7c754f8a32eb30649020d509972bd8267d09c5764ea992925.exe

  • Size

    64KB

  • MD5

    18a2548ef2c7509db70bb9c6817da990

  • SHA1

    d247979375ea4fd47e11f5b1a4d0aef3ba82440a

  • SHA256

    ed722c39067548d7c754f8a32eb30649020d509972bd8267d09c5764ea992925

  • SHA512

    988dd812de7b19e4f9dc398d0627ab87a6893c2d4db86b1c13babfb52ba227204050431c1689438470871d644de2f0bd942ed51d89cfe45400ab323bcec9990a

  • SSDEEP

    768:Af33iSW+AYmNn8hnWDx87reBqfE9OlrcF0/0uCuyWPPW992haewy6Sgu9:03PvAV1gnWurwqs9Oq62xh6

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed722c39067548d7c754f8a32eb30649020d509972bd8267d09c5764ea992925.exe
    "C:\Users\Admin\AppData\Local\Temp\ed722c39067548d7c754f8a32eb30649020d509972bd8267d09c5764ea992925.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1744
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1288-59-0x0000000077C30000-0x0000000077DD9000-memory.dmp

    Filesize

    1.7MB

  • memory/1288-60-0x00000000022F0000-0x00000000022F8000-memory.dmp

    Filesize

    32KB

  • memory/1744-54-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB

  • memory/1744-56-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1744-55-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1744-57-0x00000000003E0000-0x00000000003F9000-memory.dmp

    Filesize

    100KB

  • memory/1744-58-0x00000000003E0000-0x00000000003F9000-memory.dmp

    Filesize

    100KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.