Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 06:21

General

  • Target

    593cf32aef5124ffeb599f3b95205ee7.exe

  • Size

    39KB

  • MD5

    593cf32aef5124ffeb599f3b95205ee7

  • SHA1

    e50ecc3460017907ad8c3a341e11eab084c915e2

  • SHA256

    bb1587472ce3c277b88840590e755223077f9ef359a72869b354ef2179664719

  • SHA512

    7f8f247098a66d0164cfb0daae3374193aa362d832a1160a7487141720629bfee9e7632f0c56dd6cd69940202a191cfe67fdbbad198ef9ebed1c839ee04eea2d

  • SSDEEP

    768:MbodXomvtes3YwBvZgV/RYqsU77WVHIWicR41HYcYdD:MsFVtwwBvWhCqswKkJ14cYJ

Malware Config

Signatures

  • Contacts a large (519) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\593cf32aef5124ffeb599f3b95205ee7.exe
    "C:\Users\Admin\AppData\Local\Temp\593cf32aef5124ffeb599f3b95205ee7.exe"
    1⤵
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1700-3-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-12-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-13-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-14-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-15-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/1700-16-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB