Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2023, 12:53

General

  • Target

    1b5f0b7c024984exe_JC.exe

  • Size

    3.7MB

  • MD5

    1b5f0b7c024984a74a932a7079cf214f

  • SHA1

    e82caf676099b670cf1d9ff74906b9beef66f4d6

  • SHA256

    f8ec0556b2fd1d4bad9ccec21626ca6f02819321aca50c7971795e3110b750ae

  • SHA512

    f8c9bc118f4c63f144d59b9e0834128b3a0619c19d658204ba0c37342174e233d52a76d5d3d1ebfbc43bf6597b6d5f131622363d58913cba2e7edb279212aaad

  • SSDEEP

    49152:y9yiCJ5rFwnANZGEXep+9TxFegOSDAmosh3ANkTTlUomDxXWGu50u7TWFTZ:5J5rFwnApezgOS9V3AMmomDEv5ZeFTZ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b5f0b7c024984exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\1b5f0b7c024984exe_JC.exe"
    1⤵
      PID:2576
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2556

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2556-54-0x00000000041B0000-0x00000000041B1000-memory.dmp

            Filesize

            4KB

          • memory/2556-55-0x00000000041B0000-0x00000000041B1000-memory.dmp

            Filesize

            4KB

          • memory/2556-59-0x0000000002750000-0x0000000002760000-memory.dmp

            Filesize

            64KB