Analysis

  • max time kernel
    171s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 03:57

General

  • Target

    7b383669be1183faa7ee13a01329a8e3b8ebc2e3cf6f37726d630f9559a320d7.exe

  • Size

    69KB

  • MD5

    44f397f6790ad95dfbe088033edd8500

  • SHA1

    ee54491645d682bbdb1f5c45324fa0b2c76744da

  • SHA256

    7b383669be1183faa7ee13a01329a8e3b8ebc2e3cf6f37726d630f9559a320d7

  • SHA512

    b9e48eec5ea2b955ae1a8a996c90123c1e84b6343a20e31d19b5ea77971c608e2b471c21cc3a5ed2ed24db63f8301fde29939fef338b00368981dd147a3caf66

  • SSDEEP

    768:nw1TUXxR6W0Rv7JeAzcoeLi8P2Qa3OsZRriafQCGMhJX56LuzxkHD/f+906C:uRRDJemeLiGI5rNfnhJp6MxgDmux

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b383669be1183faa7ee13a01329a8e3b8ebc2e3cf6f37726d630f9559a320d7.exe
    "C:\Users\Admin\AppData\Local\Temp\7b383669be1183faa7ee13a01329a8e3b8ebc2e3cf6f37726d630f9559a320d7.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: MapViewOfSection
    PID:1732
  • C:\Windows\syswow64\svchost.exe
    "C:\Windows\syswow64\svchost.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:604

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/604-61-0x0000000075521000-0x0000000075523000-memory.dmp

    Filesize

    8KB

  • memory/1212-58-0x0000000077200000-0x00000000773A9000-memory.dmp

    Filesize

    1.7MB

  • memory/1212-59-0x0000000077200000-0x00000000773A9000-memory.dmp

    Filesize

    1.7MB

  • memory/1212-60-0x0000000002240000-0x0000000002248000-memory.dmp

    Filesize

    32KB

  • memory/1732-54-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1732-55-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1732-56-0x0000000000230000-0x0000000000249000-memory.dmp

    Filesize

    100KB

  • memory/1732-57-0x0000000000230000-0x0000000000249000-memory.dmp

    Filesize

    100KB