Analysis

  • max time kernel
    150s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 14:47

General

  • Target

    easy_Malicious_2acf488d4fe1d629b80c701f98e223d3546c8026679ec3260ad18f3da52cc353.exe

  • Size

    1.6MB

  • MD5

    f7ff7c6260c7086c24c5f0b824726abe

  • SHA1

    0090037c0e8c0fca542d50dffc5d86cb0f469eec

  • SHA256

    41f6b2c6500011da50d5fd8da22196c09d0d82eb4b3f6d4379d0a589c7d4c0f1

  • SHA512

    7f0aaf80ff3cf4930d23fbe13ab519f5814172b87db9ad7b615f6926f648b6c2751a75e32650f83daa0c7a8fa77e5db58bc4cbb5a4803c043e8738de3b6c2903

  • SSDEEP

    24576:91bp6Y+1PSf5ElV++iN1aZ4gphmSG0XtRc95Nxnl1QFJrBknvLKZy3UCDIT8V:936ZSf6VWaZbhR7o5fl8BknTd3DI2

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_2acf488d4fe1d629b80c701f98e223d3546c8026679ec3260ad18f3da52cc353.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_2acf488d4fe1d629b80c701f98e223d3546c8026679ec3260ad18f3da52cc353.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX538F.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    1.6MB

    MD5

    70cac594c058c71b91b8180831c4e674

    SHA1

    63f4147b2c8fe0c862ed90b2ec816866bf28e35c

    SHA256

    710a95cd191d25d7157ca78256c7702eeaeaf06adeb1e4e5654c98670077d4b1

    SHA512

    3f63948ec4f9f95c19bdf41e746b06452393d81f930415477e2ee954eae5697f278d7489ec7f2a008335c78e8cf1606a2d223c27c4eaa2266c62a1d0518ddee3

  • memory/2272-171-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-172-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-167-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-169-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-170-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-166-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-173-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-174-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-175-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-176-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-177-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2272-178-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB