Analysis

  • max time kernel
    142s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 15:19

General

  • Target

    easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe

  • Size

    288KB

  • MD5

    22deae01b01d6758f25c9049a8cd07e2

  • SHA1

    0cb647a8c70f873d2af3a8aa36f51e4c47f3b598

  • SHA256

    ce5d1ecd227bb320a00ac897a0ec79fdf61a706119031dbd51cb224891c68a15

  • SHA512

    c33a6acc4b33de7a3857b613b3cd23a7d911e12485cf95d7d337b7dcf5a582b95651101d4743f0c846db6fbbe677d26e6e20a5431485c0cb10f35b2ffad2195a

  • SSDEEP

    6144:W731bdBaB0LALXMUJ+SYR7TK+8s+Xy/808G96KmCc+YsmrTOJNSchD:c1bpk7MUkSYENzyEFCc+RQTS5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX9BC6.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe

    Filesize

    333KB

    MD5

    743bbf9488b8b513dc97a66771ffebda

    SHA1

    7a730cd1b4661e91158fa20c938647104a04dc85

    SHA256

    d50adba7b1d607e511fb85bf6e2b503bdb20373a12e7a98abfef1afee20d9568

    SHA512

    d9c3c6f4f67acbc0c5fff151c9e8c02cfbf30fa9088ba35bc2d159439302a63eb43c2384d99ac91ecb8dc400493be0ae86e1e7cc1d64d933444e5f34c2f82b5c

  • memory/1700-161-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-162-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-157-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-158-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-159-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-160-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-82-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-156-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-163-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-164-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-165-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-166-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-167-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1700-168-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB