Analysis

  • max time kernel
    150s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2023 17:02

General

  • Target

    easyMalicious2ebdb39d7c4e.exe

  • Size

    717KB

  • MD5

    3690436987b5c388b3ab1a0cd8676849

  • SHA1

    c5098977d9d72a90f5ff5ad7095323b95865e241

  • SHA256

    15628557ec95cf00fe2ef7cddfd4f2a02dda9a0f960199a88f2e13fb58569706

  • SHA512

    c3ab1306971b538255002caaa2c15cd9bdaeabd93cdae3aa89db09bdf2a074b4527f2d924b6cd29c1cc05f5d0c6bd7ed5e72864d747d32b1a89632700527b8b4

  • SSDEEP

    12288:51bVjsHP8jyFehcnRXC9ADBJbkPgRg3PZj46kToKmX7ksIxOH4NO3itGG:51bV4HP8jwHnRSiDBJsgmp4+XwUOOy1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious2ebdb39d7c4e.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious2ebdb39d7c4e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXE246.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    750KB

    MD5

    2f9a3e1e0b68be36b1c3bcf505fed945

    SHA1

    c271c8a4bb1b5c37884bc8ffdb5a3915819dfa00

    SHA256

    91eccd64d2e825a350e06afee686452ca2f224cf78cfed5d6f337f74cb7daa4c

    SHA512

    fc3958c2df57cc5d83a463af73037d431fb92dc8e9a0aa608ac916ef3816ee82406276b4cbda8d14fd7f7e6ad18d3c02dc9043e256e1208634e21adb85b68b32

  • memory/1292-173-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-174-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-169-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-170-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-171-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-172-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-81-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-88-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-175-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-176-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-177-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-178-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-179-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1292-180-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB