Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2023, 15:59

General

  • Target

    Easy_Malicious_1d56185cb7793bca3f69b9ba93700f5f857d8a0ff2050b97574efc9dfc59ecae.exe

  • Size

    1.6MB

  • MD5

    adc715ea86d962c02eef84a797f60bc9

  • SHA1

    7050f6589cdd619889cc06213af0ae4fa2ca4a63

  • SHA256

    ec0af636c7afd6c2bf002f30fdcecd74dcf4c9911489067025bbbd0b2a6ebdc9

  • SHA512

    655ee32af962cc3f865612fe25d57ec6523a530b8c7605a65d94e6e0025c104c28dcab5dced5f188b25b478209a69962379ba30e9ad3084c370b29015198750e

  • SSDEEP

    49152:9RW5Nug4kXOX3761uKzY/72hDODGK2nw/Tofp/gW2H6ygK:TIZ4keX37MhzY/72hDpFpgW2H6/K

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_1d56185cb7793bca3f69b9ba93700f5f857d8a0ff2050b97574efc9dfc59ecae.exe
    "C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_1d56185cb7793bca3f69b9ba93700f5f857d8a0ff2050b97574efc9dfc59ecae.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    1.6MB

    MD5

    02c7156743f948594038c8baab2bbf40

    SHA1

    056d458b9e2431a4c65dea819901978744a09783

    SHA256

    59c057b9f778cadc50c17773c50aa101613f75e9860f724a489d718887565b71

    SHA512

    c0050d4f8a84fff072c8cc2d4e8fa91e9126834287c630a4359292d00b95fff8bba511f21b982333828875012dbc2ea0631e90ecf9047375d0b17ddb8b608649

  • memory/3144-153-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-175-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-215-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-216-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-217-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-218-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-219-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-220-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-221-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-222-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-223-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-224-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-225-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3144-226-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB