Analysis

  • max time kernel
    140s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 16:31

General

  • Target

    easyMalicious184e677feeef.exe

  • Size

    114KB

  • MD5

    512ff8762a3ac8b51daa3be5067d27ac

  • SHA1

    9d84bfc45fd8d3e3bbca8a865d7781682a5f1071

  • SHA256

    804db87eb5cc8b6c4775ef00c88269335a7ad9962eb838233583d62e5704ca50

  • SHA512

    93825d1517a30dd4973bfc6ca8ddadac6574573d5dc73c8f08abb76c4104e3a41002807ada200942dc208f0c54b90a1eff82e7827eb748cdf6b7153e5a6cb01a

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XklATx6roQyQbMeROs1ejoWPXdhFd9nXZmdNA:51B31bdBob2QX9TWyczrGXNnQVdm

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious184e677feeef.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious184e677feeef.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2948

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX28EC.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          114KB

          MD5

          512ff8762a3ac8b51daa3be5067d27ac

          SHA1

          9d84bfc45fd8d3e3bbca8a865d7781682a5f1071

          SHA256

          804db87eb5cc8b6c4775ef00c88269335a7ad9962eb838233583d62e5704ca50

          SHA512

          93825d1517a30dd4973bfc6ca8ddadac6574573d5dc73c8f08abb76c4104e3a41002807ada200942dc208f0c54b90a1eff82e7827eb748cdf6b7153e5a6cb01a

        • memory/2948-189-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-190-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-100-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-83-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-187-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-188-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-78-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-95-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-191-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-192-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-193-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-194-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-195-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2948-196-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB