Analysis

  • max time kernel
    17s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 18:20

General

  • Target

    IMG054025602016-JPG.scr

  • Size

    238KB

  • MD5

    af0deacaa3423b84cc1108009782f4d8

  • SHA1

    5c98c215e335d7f1073350883366e2080f9d9286

  • SHA256

    16ba6496c0cb6264ba6d32990546f41950cfb57951ab8303f62a841d69daf9cf

  • SHA512

    31f65129d5ee1c30f62ca69fb01a582f8aaeae5bf85069844188977a397613db60e717f82bf9c249f1300f9fd01b7586f716d3fc2559483199858e314d7d1292

  • SSDEEP

    6144:aJXYl0G7ZfLABcBkM5czMckVV9OzEzEVpaAF4I1ep:hrY+yjkVV9OwV64I1M

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG054025602016-JPG.scr
    "C:\Users\Admin\AppData\Local\Temp\IMG054025602016-JPG.scr" /S
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\IMG054025602016-JPG.scr
      "C:\Users\Admin\AppData\Local\Temp\IMG054025602016-JPG.scr"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2828
      • C:\Windows\M-50504502627025040596038559683020\winmgr.exe
        C:\Windows\M-50504502627025040596038559683020\winmgr.exe
        3⤵
          PID:2684
          • C:\Windows\M-50504502627025040596038559683020\winmgr.exe
            "C:\Windows\M-50504502627025040596038559683020\winmgr.exe"
            4⤵
              PID:3044
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\yyhcloiikg.bat" "
            3⤵
              PID:268

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\Cab5997.tmp

                Filesize

                65KB

                MD5

                ac05d27423a85adc1622c714f2cb6184

                SHA1

                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                SHA256

                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                SHA512

                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

              • C:\Users\Admin\AppData\Local\Temp\yyhcloiikg.bat

                Filesize

                212B

                MD5

                628b9b2672a6a9f5aaa6cd89c34c29ee

                SHA1

                96f5decb262bd989d519eef58c19f64ab2c0a661

                SHA256

                78c57731f5997bda672369396f6c90b99bf0d035e78af22fbd667970dc38bc0c

                SHA512

                bab76a2cb545c6bf294a695a92a1caff388048d1c366509657698ad39236e6b1c06b724aa4ef800a568cf8661c132d085bc17920f5b6a0f3c846081ba834b20f

              • C:\Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                125KB

                MD5

                7e922e52d70d94ca5149866248b62903

                SHA1

                5b465752a032d74851a459ef927cf2a867273d98

                SHA256

                74099bf9442675d7368f3f85c504e8a0c55d895587ab0ee6409169af47aae4f5

                SHA512

                c9793c3af16e3a06dd0a9c353358905bb611f16611f17a448dea7d679cddc925709ef7e242af4b3daafa3a3087377b4c888993ba446cd6e4f1af318393b79b28

              • C:\Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                71KB

                MD5

                fea31580ef85e8e03857788dd537d651

                SHA1

                049856cf045bf6fd325eef59be910fc82fb08c20

                SHA256

                a7354b017d438e6d2d6c3335413a3ba66948821a84154b720da2e912141e3765

                SHA512

                b6c22fcd2a2b32e5c71f71f4eb389742647f0c71661a03c10158e35e19136737a00a01d74b491ec6fa9705c2ab7ab610bef2472e76e460b07d75af1222d9270f

              • C:\Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                31KB

                MD5

                145b967a88d821ca51417e026006d687

                SHA1

                90502c88351e952cba1a27191c76cbfb3f214303

                SHA256

                c1260b45a9c910b9443898f100c06e4c22b67ccac58ff1c747a72780a0d5d3db

                SHA512

                e5a8079a9260b95b545a242d5b5fbf70ec7de5d24d86b8c8196bb08dd1bd05dc570981b5ed0e2dce85b0cb395baa118bc3988acb402421da4e74458939332c9b

              • C:\Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                39KB

                MD5

                6e911318b46fd2402c0e564386906947

                SHA1

                166a244de5b42e00a3111b334fa279a06bc965a9

                SHA256

                060f577b46ff50136779592ed0b18e52bb338374a4419e6ef81ae5ae6d8aa7ca

                SHA512

                4305f02e4e2880af126748e9eecc1590ffdc7d6c7b8a2a83c4d6210c4f220cf181c96e3c2f80075947440537282832b26464ad0d49c5d5d70ea0955fb20230b7

              • \Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                92KB

                MD5

                3bcf4daf93677f50d840cdc3e6c624ce

                SHA1

                574b0b56c9aca82324b37ec4becc0b8e757c7337

                SHA256

                b05b751848b26c22668574089972091a37d0c18376ac794cf6d0d694011f9f4d

                SHA512

                151253dbf2fc93ea92fcc35b4481552729b5bf29ddc0957d06e8b4c2c102a6f58b9b471575300d6ab8a4c2c108aa7eb11929e18b3897b2907561121ac776ffff

              • \Windows\M-50504502627025040596038559683020\winmgr.exe

                Filesize

                28KB

                MD5

                39278548e7fd3db1bfffb876b083529a

                SHA1

                a4f050bd26b73d255fdb1f69df4e9bf6bfd46d5c

                SHA256

                cc2c86b61d9e3406a0c451af7c11fcaa9d1bf8f71d772eca311efe3ded15b8c4

                SHA512

                28c75309df9ad82c44f9afa4bcf3033439d146015111710752751d4a5a3379f3bfd7cf50fb35eef8f9904a2a675525a0fc8cc0e77bdd0630964e437e020bdb1c

              • memory/1464-41-0x0000000074650000-0x0000000074BFB000-memory.dmp

                Filesize

                5.7MB

              • memory/1464-0-0x0000000074650000-0x0000000074BFB000-memory.dmp

                Filesize

                5.7MB

              • memory/1464-2-0x0000000000A60000-0x0000000000AA0000-memory.dmp

                Filesize

                256KB

              • memory/1464-1-0x0000000074650000-0x0000000074BFB000-memory.dmp

                Filesize

                5.7MB

              • memory/2684-53-0x0000000074600000-0x0000000074BAB000-memory.dmp

                Filesize

                5.7MB

              • memory/2684-55-0x0000000074600000-0x0000000074BAB000-memory.dmp

                Filesize

                5.7MB

              • memory/2684-54-0x00000000000E0000-0x0000000000120000-memory.dmp

                Filesize

                256KB

              • memory/2684-78-0x0000000074600000-0x0000000074BAB000-memory.dmp

                Filesize

                5.7MB

              • memory/2828-40-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-21-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-23-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-28-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-31-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-34-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/2828-39-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/2828-25-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB

              • memory/3044-73-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/3044-80-0x0000000000400000-0x000000000040C000-memory.dmp

                Filesize

                48KB