Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 14:49

General

  • Target

    301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c.exe

  • Size

    2.9MB

  • MD5

    393bebefdaaa3c29f3851fc19754247d

  • SHA1

    2b496371713a0e4fb6b9a277d0c1c56f57b5fd56

  • SHA256

    301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c

  • SHA512

    4113327915758ecc4aa8faa086c89ecdf84bef516cdd74eafe48589c7574e2f34f96c01c2b07dd373b0acd2018329537fe473e55c58fd4811ef8bae2b64a90ac

  • SSDEEP

    49152:Xahsg+KfxXRSyyXLBZa+KSBzLaPcTv08mHLWTmW8:Xn1URSy4FZaWzLs8m

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c.exe
        "C:\Users\Admin\AppData\Local\Temp\301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Users\Admin\AppData\Local\Temp\301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c.exe
          "C:\Users\Admin\AppData\Local\Temp\301336390b20727c242e687c9fa9125fb13d64c4ddb5a9f9e181797ae092334c.exe"
          3⤵
            PID:2676

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1260-3-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/1260-5-0x0000000002230000-0x0000000002231000-memory.dmp

        Filesize

        4KB

      • memory/1332-0-0x0000000001020000-0x000000000130CE43-memory.dmp

        Filesize

        2.9MB

      • memory/1332-1-0x0000000000A20000-0x0000000000D0D000-memory.dmp

        Filesize

        2.9MB

      • memory/1332-6-0x0000000001020000-0x000000000130CE43-memory.dmp

        Filesize

        2.9MB

      • memory/2676-4-0x0000000001020000-0x000000000130CE43-memory.dmp

        Filesize

        2.9MB