Analysis

  • max time kernel
    143s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 20:44

General

  • Target

    038288d17474db91bf81b1f7a0009ffc.exe

  • Size

    58KB

  • MD5

    038288d17474db91bf81b1f7a0009ffc

  • SHA1

    477bd93a617afba29f03cd023d80d980e601246d

  • SHA256

    72944d9bceaa8c5b7fdc292536a8a84873cfa83e312d5137bcacad4154a7bd1b

  • SHA512

    76e42a7372f646d81167af23d295eac62bdd889cbd6f94165c3fb8bc3a5023a2d5bbb2a352e71cf5bda062c3e187ef1bbee169097dc2505ed8df47390d264444

  • SSDEEP

    768:C7HXD82PGkvpkwCpAudJ9iCM5da8q6Dh/TluAjhcnPrLh3szNJ89XOaZJgUKU4kf:4TokvpkrA9CMzvqI/TlHu3TZJRx4km

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs .reg file with regedit 15 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\038288d17474db91bf81b1f7a0009ffc.exe
    "C:\Users\Admin\AppData\Local\Temp\038288d17474db91bf81b1f7a0009ffc.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:1640
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2672
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2692
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2928
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:3024
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:1732
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:436
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:764
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2876
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2024
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:948
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:1540
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2904
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2852
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Windowssharedapp.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\038288d17474db91bf81b1f7a0009ffc.exe

    Filesize

    58KB

    MD5

    038288d17474db91bf81b1f7a0009ffc

    SHA1

    477bd93a617afba29f03cd023d80d980e601246d

    SHA256

    72944d9bceaa8c5b7fdc292536a8a84873cfa83e312d5137bcacad4154a7bd1b

    SHA512

    76e42a7372f646d81167af23d295eac62bdd889cbd6f94165c3fb8bc3a5023a2d5bbb2a352e71cf5bda062c3e187ef1bbee169097dc2505ed8df47390d264444

  • C:\Windowssharedapp.reg

    Filesize

    182B

    MD5

    568bbef8d7ae8d72613e1311b5c09454

    SHA1

    6a4116130552c5a1bfe352f491829808857c6cb2

    SHA256

    4ca1b9e005ccb696878960764e791ab68f1ea916ebb21776e88e1201d8501fa0

    SHA512

    25f990212584a50068818c994ddbcdebbcbf3f700fd1e6f5faa0e0b15608d361367434257bae13d916fa0fe5fdc6a0d257d42a4a48e91074264e689f4aa0edb0

  • memory/2000-30-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-14-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-18-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-23-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-6-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-35-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-39-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-43-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-47-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-51-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2000-55-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB