Analysis

  • max time kernel
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2023, 16:38

General

  • Target

    easyMalicious1bb3e5948637.exe

  • Size

    87KB

  • MD5

    908db10c6bd4be272ead7755d9a7c5cc

  • SHA1

    18d1912137252e7e073e465c9c8306c11c33b88f

  • SHA256

    bbdf5bfbf510a7869d70238963df51efeab4fd5eefe5fd655dc8fbdad6d895b2

  • SHA512

    7b46ba5afcd262c570de9f050198ff37d0eaf4e36d684fb83e54a17dc59987952da9d55ca37f201cdacf95f2b46523fc73882d28233da740bba74bd951849277

  • SSDEEP

    1536:kaiqH1s+kCtrA2UMT0mTFibDKa1XF+ofM3Ni4vKZ6ZeNOV4:t1B31bdBob2QXsB3DU6Zec4

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious1bb3e5948637.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious1bb3e5948637.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXE9F3.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    87KB

    MD5

    908db10c6bd4be272ead7755d9a7c5cc

    SHA1

    18d1912137252e7e073e465c9c8306c11c33b88f

    SHA256

    bbdf5bfbf510a7869d70238963df51efeab4fd5eefe5fd655dc8fbdad6d895b2

    SHA512

    7b46ba5afcd262c570de9f050198ff37d0eaf4e36d684fb83e54a17dc59987952da9d55ca37f201cdacf95f2b46523fc73882d28233da740bba74bd951849277

  • memory/568-234-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-235-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-230-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-231-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-232-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-233-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-152-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-169-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-236-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-237-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-238-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-239-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-240-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/568-241-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB