Analysis

  • max time kernel
    149s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 16:52

General

  • Target

    easyMalicious290f005eb89a.exe

  • Size

    583KB

  • MD5

    c5432a72571b96840cceb1a9f3632e44

  • SHA1

    00502b61a8221841057934d8df2d567fcae75112

  • SHA256

    f4c9450208b5fe805a5bda89af3308e17b512f693893c120b8eea617fd03f77f

  • SHA512

    e3bad37276be2762ee462a92b41c1e8ab114b8e2e40c2b383f2d765212436c93778269e5957d8731b45fefc9c036911e6916514cc64c4f63ece91406b0e8035d

  • SSDEEP

    12288:51bz5/JrM6qJyGt9GO0S0QSoFohsMdXZ0aOHvw1mC/9:51bz5Rr/uyQt0SW5dXtjl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious290f005eb89a.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious290f005eb89a.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX5D8E.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    618KB

    MD5

    60aeb47105ce966f553248e726de49ba

    SHA1

    f6704edac7e528d5a257ac823d65ce9a0dc3618b

    SHA256

    aa29c565a45cc1987e135292b1aecd8158a18f7230e2c37afaa9830d55550425

    SHA512

    da6c496ef9927441bf0fbbba95df8e6b7ffed7c55bd2968de896544ce3c447773dd67c4069d4dbcdfa956f24e10f1ec89bcca956e31f0ebbfb943191155c23e1

  • memory/2320-168-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-169-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-164-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-165-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-166-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-167-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-88-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-163-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-170-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-171-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-172-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-173-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-174-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2320-175-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB