Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 00:00

General

  • Target

    d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d.exe

  • Size

    964KB

  • MD5

    77ec6588655a16a9fe524edb90d10758

  • SHA1

    878e4cd7fa0e5dfdc3d8310b77f4d1763f991a61

  • SHA256

    d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d

  • SHA512

    41881149b743f41f83333023415c4c98fb70f147cf461b4bb12ab1135027ee9a04ecf061adc6e8808bf20b59bab34dab3ab48137b2607be71a17245d56b6990d

  • SSDEEP

    6144:f4XtR7Mr2N5Og12D5RiWfghZarn2cNVUufkihMHVeG9QgVLOSv5fE6xZqI7yY5NP:faR7Z5OgImU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d.exe
        "C:\Users\Admin\AppData\Local\Temp\d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d.exe
          "C:\Users\Admin\AppData\Local\Temp\d7355e36bd4bc4649f46461de104c113a8e1efa41047c9c6d63cf33fb797be2d.exe"
          3⤵
            PID:1636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1216-4-0x0000000002B10000-0x0000000002B11000-memory.dmp

        Filesize

        4KB

      • memory/1216-5-0x0000000002B10000-0x0000000002B11000-memory.dmp

        Filesize

        4KB

      • memory/1636-2-0x0000000000260000-0x000000000035396F-memory.dmp

        Filesize

        974KB

      • memory/2424-0-0x0000000000260000-0x000000000035396F-memory.dmp

        Filesize

        974KB

      • memory/2424-1-0x0000000001CE0000-0x0000000001DD4000-memory.dmp

        Filesize

        976KB

      • memory/2424-6-0x0000000000260000-0x000000000035396F-memory.dmp

        Filesize

        974KB