Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2024, 08:13

General

  • Target

    586def827956e53c51e586505d2451f5.exe

  • Size

    88KB

  • MD5

    586def827956e53c51e586505d2451f5

  • SHA1

    cc09103f934b561db41dfad7ef3f60817aab90fa

  • SHA256

    dbd74615266beda0bce1fdafa02b16051e324d88b82da93235e3b52c7a08c3ac

  • SHA512

    8a4902c55c80061b58a7c2dbaf34916ca36e00be96e1bf4682b310254878e0e90a5e4c47055edbe0cdfaa5c206eecb4bcef0a4f960ff49c835f0bd852144be3a

  • SSDEEP

    1536:nLPFdtOaDq3OBweZGRSTQy5Aw8IA4AqNVbcAtInH9FbDfEyzX2eupC6qc9I7fs8f:nLPFdsaW3MNFZAw8INAScKI1jLGeuptA

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\586def827956e53c51e586505d2451f5.exe
    "C:\Users\Admin\AppData\Local\Temp\586def827956e53c51e586505d2451f5.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\w32tm.exe
      w32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\system32\w32tm.exe
        w32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov
        3⤵
          PID:3016
      • C:\Windows\SysWOW64\w32tm.exe
        w32tm /config /update
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2204
        • C:\Windows\system32\w32tm.exe
          w32tm /config /update
          3⤵
            PID:2744

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\glok+serv.config

              Filesize

              7KB

              MD5

              e22a47defa3dcca817df6c896a33a879

              SHA1

              a4fe30f4f1884409d00904e6dd606d1d65b8af68

              SHA256

              d19b0ebc64d31e2e5030dd890707a3ab7ead1e5a4d59076da21597eada2a9618

              SHA512

              1c49d1b1d18ea0c9b5c07b4fb6f9cf36e420b0680a9a88917995176bcfaee664306006a6bf7551b36b5afca03bae7a21227d2eae4a6600005fec76bd6b767da7