Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 23:39

General

  • Target

    1a35c876cec9dd9882ad6fbb00ad8cec.exe

  • Size

    1.0MB

  • MD5

    1a35c876cec9dd9882ad6fbb00ad8cec

  • SHA1

    328292a8d839f1ff7be8711c3f5ae58add04fd0f

  • SHA256

    d4808f16c7a021bb8136de7b3465fcea4f791e7c39d48273723c8d0b72bbabd4

  • SHA512

    73985690eb79b4836e16bb9fed270370eb8e9d16ba84a9dfba43fee25038153a30742988a96b87afbf66ffee88b5920d0ffb9da06c3eb297b35973d518b2b3d8

  • SSDEEP

    24576:hz5y8dMeWB97t1WzI0n4O5OgXMLxwrbwb/t9C+U0T9HC:ha7xBdwrbmFnTg

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a35c876cec9dd9882ad6fbb00ad8cec.exe
    "C:\Users\Admin\AppData\Local\Temp\1a35c876cec9dd9882ad6fbb00ad8cec.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\1a35c876cec9dd9882ad6fbb00ad8cec.exe
      "C:\Users\Admin\AppData\Local\Temp\1a35c876cec9dd9882ad6fbb00ad8cec.exe"
      2⤵
        PID:2680

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\1a35c876cec9dd9882ad6fbb00ad8cec.exe

            Filesize

            1.0MB

            MD5

            1a35c876cec9dd9882ad6fbb00ad8cec

            SHA1

            328292a8d839f1ff7be8711c3f5ae58add04fd0f

            SHA256

            d4808f16c7a021bb8136de7b3465fcea4f791e7c39d48273723c8d0b72bbabd4

            SHA512

            73985690eb79b4836e16bb9fed270370eb8e9d16ba84a9dfba43fee25038153a30742988a96b87afbf66ffee88b5920d0ffb9da06c3eb297b35973d518b2b3d8

          • memory/1044-0-0x00000000002B0000-0x00000000002B1000-memory.dmp

            Filesize

            4KB

          • memory/1044-2-0x0000000000400000-0x00000000004F2000-memory.dmp

            Filesize

            968KB

          • memory/1044-7-0x0000000000400000-0x00000000004F2000-memory.dmp

            Filesize

            968KB