Analysis

  • max time kernel
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 15:19

General

  • Target

    easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe

  • Size

    288KB

  • MD5

    22deae01b01d6758f25c9049a8cd07e2

  • SHA1

    0cb647a8c70f873d2af3a8aa36f51e4c47f3b598

  • SHA256

    ce5d1ecd227bb320a00ac897a0ec79fdf61a706119031dbd51cb224891c68a15

  • SHA512

    c33a6acc4b33de7a3857b613b3cd23a7d911e12485cf95d7d337b7dcf5a582b95651101d4743f0c846db6fbbe677d26e6e20a5431485c0cb10f35b2ffad2195a

  • SSDEEP

    6144:W731bdBaB0LALXMUJ+SYR7TK+8s+Xy/808G96KmCc+YsmrTOJNSchD:c1bpk7MUkSYENzyEFCc+RQTS5

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_25ca91e0d2c46fcc70c70e2469afca66ccfb73b7ce36b2e0dddd0fe547d504d8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:5048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX681D.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    288KB

    MD5

    22deae01b01d6758f25c9049a8cd07e2

    SHA1

    0cb647a8c70f873d2af3a8aa36f51e4c47f3b598

    SHA256

    ce5d1ecd227bb320a00ac897a0ec79fdf61a706119031dbd51cb224891c68a15

    SHA512

    c33a6acc4b33de7a3857b613b3cd23a7d911e12485cf95d7d337b7dcf5a582b95651101d4743f0c846db6fbbe677d26e6e20a5431485c0cb10f35b2ffad2195a

  • memory/5048-255-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-256-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-156-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-252-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-253-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-254-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-153-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-174-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-257-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-258-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-259-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-260-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-261-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-262-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5048-263-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB