Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2023 17:01

General

  • Target

    easyMalicious2dc54ddbb9d3.exe

  • Size

    1.1MB

  • MD5

    36658557553f149c8d766cd689242029

  • SHA1

    0c718f9edd862448fb126946164f8d56b67149f4

  • SHA256

    61a3cd98cd3e9d0de77c045396f4032e700b1b0ea0772f25ec365aee3c48042e

  • SHA512

    1b6f030642a2ca37e92b803ba998fecd68f53eee2364f5a144a0662df8b11af46576d36b5c7334d28902230e4b96021317cbfb4a4661b3838e840986f71b83cf

  • SSDEEP

    24576:c1b30vFpkTEvqlrjgUIUqQ6qG2yZ3BUC43kKjEEcEf7hiU/gIGLL8RzFgZsEw:cXTEnU4Q6LL3BUCIkwE7Eh/4xLL8gZg

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\easyMalicious2dc54ddbb9d3.exe
    "C:\Users\Admin\AppData\Local\Temp\easyMalicious2dc54ddbb9d3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXF0D9.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7z.exe

    Filesize

    1.1MB

    MD5

    7719f00de634459d622c9a12ef6a8ad3

    SHA1

    01142eb7a8529d72ed7c1be2f53839ae5f4e6c9a

    SHA256

    f2f27343c342680717bcb740c59c9ec7872ffaf6f387358326cc167a58bb330f

    SHA512

    45101edfe88eb213050cd8deb34844ceb60e97b730c57df7f056bac7dd0298df6186941baf4d22a3ae4b2b63081112fad7cc3805a7f6421b48a2b6438bba59db

  • memory/4440-254-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-255-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-250-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-251-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-252-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-253-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-153-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-249-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-256-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-257-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-258-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-259-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-260-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/4440-261-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB