Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 16:27

General

  • Target

    easyMalicious144f95658b61.exe

  • Size

    717KB

  • MD5

    94faeebb39b77fa9ed0385e5e240adcd

  • SHA1

    3359bbd3a5f7c515c25b16ff33a83ad486c6f170

  • SHA256

    851588ba0f7eae0c683a030cc51819e978643f619581f0714c2832141c149c95

  • SHA512

    f9f223c056af3b553f22f6f5d6c3ae3449e3feba5f174781795bf5a8d458bde2f6d989de7239813a9e21b9ad6bfcc76b03829fff8896453a6f0af431a6017374

  • SSDEEP

    12288:51bdg5sHXHQTBNKPJtrw68oYTEXMvwJ9xzFL45RticyC93egmEosv1kiH16+HOcx:51bdg5mgTBN6JlD8OcQ7213eXEJdkiHh

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious144f95658b61.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious144f95658b61.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX2315.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7z.exe

    Filesize

    753KB

    MD5

    0772c11009853499a4ae28d6a4b9bd1a

    SHA1

    66c235114690de4f69a5214ac9953e339825cb48

    SHA256

    fa32d780d17e01ed2d562fe9a1716ef01feabb5c31a9f32fb451b8c79268c0e4

    SHA512

    7e81271393c21f628496e90906202b0df6bc80505ec3fb5bb69bd6c28962f8cd3bb85776ad9271a5fa51f9f7eff132f23e9d3dab7ef4ee81d228e0477a2b5b8f

  • memory/3972-237-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-238-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-233-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-234-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-235-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-236-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-153-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-156-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-239-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-240-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-241-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-242-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-243-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3972-244-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB