Analysis

  • max time kernel
    149s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 15:09

General

  • Target

    easy_Malicious_144f95658b61d825df2d7ede8dcb421056b3aa1e1df516ab1dd88931c76f0d88.exe

  • Size

    717KB

  • MD5

    94faeebb39b77fa9ed0385e5e240adcd

  • SHA1

    3359bbd3a5f7c515c25b16ff33a83ad486c6f170

  • SHA256

    851588ba0f7eae0c683a030cc51819e978643f619581f0714c2832141c149c95

  • SHA512

    f9f223c056af3b553f22f6f5d6c3ae3449e3feba5f174781795bf5a8d458bde2f6d989de7239813a9e21b9ad6bfcc76b03829fff8896453a6f0af431a6017374

  • SSDEEP

    12288:51bdg5sHXHQTBNKPJtrw68oYTEXMvwJ9xzFL45RticyC93egmEosv1kiH16+HOcx:51bdg5mgTBN6JlD8OcQ7213eXEJdkiHh

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_144f95658b61d825df2d7ede8dcb421056b3aa1e1df516ab1dd88931c76f0d88.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_144f95658b61d825df2d7ede8dcb421056b3aa1e1df516ab1dd88931c76f0d88.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2088

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX4637.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          847KB

          MD5

          d9a34eb96ff735d58c74aa30f4fb53e1

          SHA1

          bb590dc73c6bfcdfd24414d9e2be13b8cfcc4287

          SHA256

          d77dbc2f2686a4e5d06fdd02857c5d527104bdd5fd4d8719f88f599f6c04b589

          SHA512

          59ca96d743b2d691d0561059992aa5988bbc8cf54c40be8dc1d476f9deb185b66b23d7ac1f9c774b5861d7a5460d59d233f5b0a59a46f115e29c2a8b6647b38c

        • memory/2088-165-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-166-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-161-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-162-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-163-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-164-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-159-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-160-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-167-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-168-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-169-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-170-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-171-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2088-172-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB