Analysis

  • max time kernel
    150s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2023, 16:57

General

  • Target

    easyMalicious2bf13f0abc2f.exe

  • Size

    1008KB

  • MD5

    692ffc72398db0b1b5aa1b1073036e16

  • SHA1

    e91059882e340c656f21b87860aef6b9c1e9ea13

  • SHA256

    f245b162bcbba03cb8729275798874b4359084eb5eaf0ba1646b62955ce5b5ab

  • SHA512

    eaafc5846fdc2451932f0a56da2c12c788e6bb2cd2cd8373ca9c828b051f3cdbaa346f29cd77e9276bc70e7f7b427d271dfdf944d303e000d60ba1ddd66ecc41

  • SSDEEP

    24576:91b/aXWwNaz5VXUozp5WPqSarfFSxUfmYv5b/p:9BFRU0ynGoWfHv5b/p

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious2bf13f0abc2f.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious2bf13f0abc2f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2312

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX5765.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          1015KB

          MD5

          e49913314d3fa5159b0d406f32c2385a

          SHA1

          b83439cd1dad3546b7ce3a230756ae481a51a66d

          SHA256

          452260fef39278d7d3a30a02192bb00449b1e4b59d737fe7e86b5985018674e9

          SHA512

          e7e80e5ed155d0dabefdbe7d92d66bc30216dbaf743247e91c57984e0c184bac4d912d0dd6e791d3776b0458096ce4f44b926a10d62ad8ef33e57c9b722b6a1a

        • memory/2312-169-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-170-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-165-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-166-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-167-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-168-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-88-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-164-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-171-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-172-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-173-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-174-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-175-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/2312-176-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB