Analysis

  • max time kernel
    150s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 13:35

General

  • Target

    78550d4eb5688bebfa9703f51fdc120b5ed4117a.exe

  • Size

    17KB

  • MD5

    e304a9fdf2d0d966876df93f306a0419

  • SHA1

    78550d4eb5688bebfa9703f51fdc120b5ed4117a

  • SHA256

    7887fbe4894a7f23047517fa03e5d5e7e214411a1b350ba82d61dd3c2aaa13fe

  • SHA512

    6e6029c897d40e81dda4d928356461ec9245f22478c714a5caeeb92d3de20a98eeaa1e48505bc77c724439eae956b85eef5368e0908af6e990809f382e35c565

  • SSDEEP

    384:R2CpHPCWBWvy9kfbGwmdG6BTsXD2ix/vwWqVrxA7Z:VkfyLG6BTsXDN/eQV

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\78550d4eb5688bebfa9703f51fdc120b5ed4117a.exe
        "C:\Users\Admin\AppData\Local\Temp\78550d4eb5688bebfa9703f51fdc120b5ed4117a.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2016

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\tciocp64.dll

      Filesize

      27KB

      MD5

      5935d035ce9f90e6436815460ec62b7c

      SHA1

      71718b202eb4bc3550dc2c8d0af8d148bf97f27a

      SHA256

      4d7805b138ee093d9cec04c1bda5a14bba74678f3c7b605d7e0761324e37eac2

      SHA512

      6580d5525491c076860edf83613548d5cfb20af86e84e526bf803a26688f14a7169fe8a1d26514fd4ad74037481b961f25e828a6484cda5ecb40e75fc2360d3e

    • memory/1200-54-0x0000000002250000-0x0000000002251000-memory.dmp

      Filesize

      4KB

    • memory/1200-55-0x0000000002670000-0x0000000002671000-memory.dmp

      Filesize

      4KB