Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 10:28

General

  • Target

    674f71b2b48443aa69cc14d1a22cecf9.exe

  • Size

    144KB

  • MD5

    674f71b2b48443aa69cc14d1a22cecf9

  • SHA1

    add0f5d3daf0f63da5f4ebfc2b47d560ea1df4cc

  • SHA256

    71fc27db789a3f9748acefa1c70bca2a6d8467f979fc99a409272ef654f9b27f

  • SHA512

    f992b075d57b3a77df921a42c454427379362d92b9c92139c97ea4d29f56441abaa2693c18534d73448e9106529b09d2dde330999fef5683b04d03dd7508c4e3

  • SSDEEP

    3072:htqQUzfxR0IGcCs9O19GsURaOcitY9tdwLi0+EF6RAn:htqQ6PRD9OebIOc8YEgRE

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\674f71b2b48443aa69cc14d1a22cecf9.exe
    "C:\Users\Admin\AppData\Local\Temp\674f71b2b48443aa69cc14d1a22cecf9.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\Users\Admin\AppData\Local\Temp\674F71~1.EXE
      2⤵
      • Deletes itself
      PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1900-2-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB