Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 13:33

General

  • Target

    2211e0f0cdd6d98dfc5e296b088e6331.exe

  • Size

    79KB

  • MD5

    2211e0f0cdd6d98dfc5e296b088e6331

  • SHA1

    fe881af50f7c2e97a1f1c62acc35a3d39f484c4d

  • SHA256

    a04eb333e01a113a91ea7661d4fe6994cbaf762764ddab05753e56bac0cff407

  • SHA512

    c6cc237aeb186464375dda56b48fbe53cad1bd87688e979376f61e01a06001aca44a7725fc726b6cf1f720b3a00f8a8cbbe60ed74f88cf86ac9b80b1a6f8100b

  • SSDEEP

    384:qGq8v5CZ9d7xz2ZfGlaKQ4ewqSPPiRa8HZTiKqv6i7VdV5vQ1tn:pRu/7flabDwxPL8HZejv6SVHZs

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1340
      • C:\Users\Admin\AppData\Local\Temp\2211e0f0cdd6d98dfc5e296b088e6331.exe
        "C:\Users\Admin\AppData\Local\Temp\2211e0f0cdd6d98dfc5e296b088e6331.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\2211e0f0cdd6d98dfc5e296b088e6331.exe
          "C:\Users\Admin\AppData\Local\Temp\2211e0f0cdd6d98dfc5e296b088e6331.exe"
          3⤵
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2232

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1340-20-0x0000000002D10000-0x0000000002D12000-memory.dmp

      Filesize

      8KB

    • memory/1340-19-0x0000000002D00000-0x0000000002D01000-memory.dmp

      Filesize

      4KB

    • memory/2232-15-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2232-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2232-10-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2232-7-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2232-4-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2232-2-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2232-0-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2372-14-0x0000000000400000-0x000000000040C000-memory.dmp

      Filesize

      48KB