Analysis

  • max time kernel
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 14:46

General

  • Target

    easy_Malicious_2bbf7224b1ab7ae6c1a5652cd5b01d2d5e9c6f8b97cec7f29b0d126489592928.exe

  • Size

    1.8MB

  • MD5

    ddabcc30774034113e4df0b4703c3b3a

  • SHA1

    9324efb50878607ac0aecc66011057a3fac22488

  • SHA256

    a501a375c0f12c9235c89c7862a8dea5891f44c36ec9d2cfb6bea705814aba89

  • SHA512

    f0b67d62ea4d2a470554873e27f929b0967b34376d88074d11f74eb4684f5f4a5e8c5210ae954428930dfbf951425372d76f040c03726a717461bddb07e559f4

  • SSDEEP

    49152:9fuGLm5Ds4Hj1lYWvAushPKDcv/OMAnoS:sVVsg1BYNnWcS

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_2bbf7224b1ab7ae6c1a5652cd5b01d2d5e9c6f8b97cec7f29b0d126489592928.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_2bbf7224b1ab7ae6c1a5652cd5b01d2d5e9c6f8b97cec7f29b0d126489592928.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXCBBE.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7z.exe

    Filesize

    1.8MB

    MD5

    cf7d6411c37230c51e7b573aa2f5355c

    SHA1

    a0e285c1c16d4860038b15faf3f6195648154461

    SHA256

    6f62d1f1e04faf3113bdeebd2fdee26192eb8bfcc9946a9733c8fc791c8c5aa6

    SHA512

    bde91058eb4331bf9af0b732b4669e591e4104f3cbaeb02fa992b0771c67acf2563be9dfcb1b3daab8014e0e6747d19b2ffcd15acdb82a6a4e46d2b385a809f4

  • memory/1700-252-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-253-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-248-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-249-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-250-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-251-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-152-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-247-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-254-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-255-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-256-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-257-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-258-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1700-259-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB