Analysis

  • max time kernel
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2023, 16:48

General

  • Target

    easyMalicious246baec5b4db.exe

  • Size

    721KB

  • MD5

    b79d8fa9aed9abfe89d53db1d0c11255

  • SHA1

    4d8554c2926a22a85a6534aacdf83669d312fdb8

  • SHA256

    28ddf248a2a5fcd96729f9107dc99aeec65588ff8e1bb2fb364588d37a9f4aed

  • SHA512

    77aeea72ed9076ee9d45051b08581ef82f99f0bec91f7c993757cf559318e1df3495c4fde4dce11d785dd3ce07f085acfac856097b5b22ae89ffd757021c338d

  • SSDEEP

    12288:V1bFpV896SFJF8AoY1NIpqRb46Q40LCplVMo7dM0ZpNnHZg4i5lz1te2:V1bFpGpErY1NPRkj40olVlpNnW4i5B1D

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious246baec5b4db.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious246baec5b4db.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\jabswitch.exe

    Filesize

    72KB

    MD5

    792b3d198fb85ca80e58140e0719e2f1

    SHA1

    a85b2ef0d0345773abc7c1b8a3709e002437ad97

    SHA256

    6f5af863e98dc157442abe18afc9af7e5e3f4b8e81b19448a1370287af88fc97

    SHA512

    04d74e15e5777e1d3a4b3e9bcdf8809510807e299c5418d1c36ace61af448104dcd3b2a1c37a149d4097830f5bbbeb191e4ec13bb3aa04657ac4b9a1ad751b10

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    847KB

    MD5

    d85e919fc9a451fb23c30600cdd79377

    SHA1

    60ef68a1bb83efd72fd64bbcfc9f49f5b09f03fa

    SHA256

    ff7fe83096218410b42327e098bd54a6090dc6a106462123ac538b31f41eb36f

    SHA512

    b1be5488f1517f252c7b84daf01211d15413477ee6cfbd9f2bd67210c25674ca0aee98530cbfb316d14adb02261bec536c618adc15bd0f66a522b7ba3b63cf8d

  • memory/3476-236-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-237-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-232-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-233-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-234-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-235-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-155-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-175-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-238-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-239-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-240-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-241-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-242-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3476-243-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB