Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 23:36

General

  • Target

    07216f96f78f6b99baf88c56017d8381.exe

  • Size

    84KB

  • MD5

    07216f96f78f6b99baf88c56017d8381

  • SHA1

    2754ffbca92d798080d56461473c2cbe2a3163e7

  • SHA256

    e7499b75ed2ff125f09fce80ee9069309ccdf6b40d59e499eed8354b2dbd40d2

  • SHA512

    6d83252e107e686d0c77e3ca29462543edb997885195b230d97fd7882698852422c1013e803599a12fe87be475b6e04fbf61ef2c3b1f130d988a120e1b3aebd5

  • SSDEEP

    1536:Q9wvQUreUbyzsB+2myhzT7hOVATx3svZ5Lm6hsUGurN63EZB:AA/yzn2myhzoV63sthhGumKB

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe
    "C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~4402.bat "C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Windows\SysWOW64\reg.exe
        Reg Query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" /v "DisplayName"
        3⤵
          PID:2844
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy .\QQLive\FlashPlayerTrust\*.* "C:\Windows\system32\Macromed\Flash\FlashPlayerTrust\*.*" /y
          3⤵
          • Enumerates system info in registry
          PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~4402.bat

      Filesize

      721B

      MD5

      8741d0b9e8150b34770bfcf573aec18f

      SHA1

      f50384b638e60b9e7a7dd920a77869009d4dea53

      SHA256

      633d7c581e641f65097f57dc7c7a61ed552553dea5691414e5bc9c5453bb3f32

      SHA512

      aeeedc5be9502c3a0cd70e659cbb0c7ae1af0595c9992d71bf7ceb9dfb83e896029fca511dbb306185d9d7b726a29000f707bc3924881a01a13a6968fec5225f

    • memory/1976-35-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1976-58-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/2648-13-0x00000000004F0000-0x00000000004F1000-memory.dmp

      Filesize

      4KB