Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 16:01

General

  • Target

    Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe

  • Size

    1.6MB

  • MD5

    3e532a53866b708a6ca522be579828b8

  • SHA1

    1c42a11620614d839c6ea3ee3e0696f05a113aa9

  • SHA256

    72f9dd6bf3a83972f67553bc4ec4be471e130b8f838c69ca07eebeea54738461

  • SHA512

    0e46c7d312c27fc08e81b06538198f3631a86811a893658f8d4f4bdb8f25f9022eab34049b6d83761608d7b9839accdc3edf3d5d2e259c18fba2c7477aea17c3

  • SSDEEP

    49152:SLTR/kHkzvESF7cGXQmLuQdXMhuh1pt5isg1:W/kHkjfcGXvLu637pt5bg1

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe
    "C:\Users\Admin\AppData\Local\Temp\Easy_Malicious_20612695e35c9c1b4a20623854025afae2f2e5d4d4fe681327901f3374afd79c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXB434.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    1.6MB

    MD5

    4cfeea5c1f958babe5011352d3e17b8d

    SHA1

    c91575cb9be2fd9fa3800d47227c5f30a30e854a

    SHA256

    39987d9f0d661505a4f4cbf4c99e0953533b6cb2d49fad34968693aa21748b02

    SHA512

    665512d390934bf5789a16ddf03d49ebce5a738e9069153b3c9ec14446e2df2d2515993f0dd858b15df832774326821d82431c3996fe9d60109c2149bab35414

  • memory/1368-181-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-182-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-177-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-178-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-179-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-180-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-90-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-176-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-183-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-184-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-185-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-186-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-187-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1368-188-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB