Analysis

  • max time kernel
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 15:20

General

  • Target

    easy_Malicious_31bcb2ae3b52e8e2dc810253341ed9201c760135e5e17e0c324ab67145801acd.exe

  • Size

    263KB

  • MD5

    ff27f80d9f64281c8b3761f46da2fee0

  • SHA1

    88651f9aebc8aecfdf5b6bdf2070276ad435bf6d

  • SHA256

    725c25d06565147ebe42eac533a552ef434a3a65c038558a409704ad82d37ade

  • SHA512

    57f9b3f578573fbad8f16e5bc105e1bc6a6baf2e769991a70b58e804fc9fb4425bf3f8c153aa45e374792e8715a0c2cd839af9aa3893cf1bcd7ff79d1d3525e9

  • SSDEEP

    6144:t731bdBaB+UV/7zV/RXq06r81Hvd8Vt12RBw6Z4mHzkaQ6+T8:91bs7JZq0qI2gRBROsRQ6/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easy_Malicious_31bcb2ae3b52e8e2dc810253341ed9201c760135e5e17e0c324ab67145801acd.exe
    "C:\Users\Admin\AppData\Local\Temp\easy_Malicious_31bcb2ae3b52e8e2dc810253341ed9201c760135e5e17e0c324ab67145801acd.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX53CA.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    263KB

    MD5

    ff27f80d9f64281c8b3761f46da2fee0

    SHA1

    88651f9aebc8aecfdf5b6bdf2070276ad435bf6d

    SHA256

    725c25d06565147ebe42eac533a552ef434a3a65c038558a409704ad82d37ade

    SHA512

    57f9b3f578573fbad8f16e5bc105e1bc6a6baf2e769991a70b58e804fc9fb4425bf3f8c153aa45e374792e8715a0c2cd839af9aa3893cf1bcd7ff79d1d3525e9

  • memory/3176-234-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-235-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-230-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-231-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-232-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-233-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-151-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-168-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-236-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-237-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-238-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-239-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-240-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3176-241-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB