Analysis

  • max time kernel
    150s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 16:36

General

  • Target

    easyMalicious19fff6ec2886.exe

  • Size

    291KB

  • MD5

    ee87d34afe06db6208ccee63b0a2a5d9

  • SHA1

    74d3d2e08823e0e24b0d80648b8996e90d267869

  • SHA256

    e8170447ee68ac31b4ba65f4715ce7565ae3f3b24a90bdaf5210f62d65ac2d26

  • SHA512

    1ba721089110afac71457aabf70ecf175ff01f633ff4aba9e02805fcb5c4595ade71a74ca85da936117f4bad06db8da3fd9dbad3edf5527f410c0ab58b29ff89

  • SSDEEP

    6144:E731bdBaBtXIixpNb6X/dhBL1Zofp5gpwGzZWJgM3JHa00:W1bOxHbC/R1ZofpIwyWhJZ0

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious19fff6ec2886.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious19fff6ec2886.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2532

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCXDFE6.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          847KB

          MD5

          a75e35d28ec0a6c7abd9d112c564d660

          SHA1

          b92af87f2070696eb127d7206f482d29a14d8f3d

          SHA256

          858312ccd60671808f9bb9a441b697fc4926dc901f7a5c00b1e234a1d9a1f7f7

          SHA512

          0a7127c5ee87b3d16410f9cd772c0264886304071b44e6011b7a0ff8be6a2ceb5cd9f09ab0d1fd23fdce5f6ecc711c0b82b496b8f540ceebd9641d4be0061a9f

        • memory/2532-161-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-162-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-157-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-158-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-159-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-160-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-89-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-95-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-163-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-164-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-165-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-166-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-167-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2532-168-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB