Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13-05-2023 14:26

General

  • Target

    tmp.exe

  • Size

    631KB

  • MD5

    145186629cf226ca987625b55ed9e9c7

  • SHA1

    8203cfc6a8dc0ffae22167e0735a6e9169fe279d

  • SHA256

    65209a1c9e0c0c1d5cfa80df4ff1ba6d1742e1b5ac8a4e32b38e49749c312cdd

  • SHA512

    57e8a81cce89bfd81610f246e7b2afb92cff1848d3a67cbaf2910c7925208262458fc37232cbcf8b26017911c923a1acd7841acb29ac9c0915bb0a13217ea5ce

  • SSDEEP

    12288:6Lo/Jm2IhImMeg+gk4GEcMRwAciycSHKW3:6LwmZMz3GuRwAcK

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/820-69-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-67-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-71-0x0000000000F70000-0x0000000000FB0000-memory.dmp

    Filesize

    256KB

  • memory/820-70-0x0000000000F70000-0x0000000000FB0000-memory.dmp

    Filesize

    256KB

  • memory/820-64-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/820-60-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-65-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-63-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-62-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/820-61-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1344-54-0x0000000000C80000-0x0000000000D24000-memory.dmp

    Filesize

    656KB

  • memory/1344-55-0x0000000000620000-0x0000000000678000-memory.dmp

    Filesize

    352KB

  • memory/1344-58-0x0000000000580000-0x00000000005C0000-memory.dmp

    Filesize

    256KB

  • memory/1344-57-0x0000000000840000-0x000000000088C000-memory.dmp

    Filesize

    304KB

  • memory/1344-56-0x00000000005C0000-0x00000000005F6000-memory.dmp

    Filesize

    216KB