Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 04:50

General

  • Target

    66be26ebc5d344ffb1a8778a1e541f87.exe

  • Size

    18KB

  • MD5

    66be26ebc5d344ffb1a8778a1e541f87

  • SHA1

    25ab61237ef95d51ada1136b6c75077aa1b8a928

  • SHA256

    8d44a0f7fa736033c6511939c9a5bb57cca5dc83ed9c41ca29ff9584fb72f138

  • SHA512

    501b1a374b170e835941dcf66fcd586e7c53337dbde7fcef5e5fcb7b75129a9a9106076d26219eab41d1cb0cb7b589c0d789ec195cd4299deb98467a7b7abd98

  • SSDEEP

    384:dopH+h4pIfwV+zhCvdgtOnLUkmTxgEC2F2SurweYIveaqCV1rz8PadY:+pu4pTECidxTxg521eZfV1cPadY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66be26ebc5d344ffb1a8778a1e541f87.exe
    "C:\Users\Admin\AppData\Local\Temp\66be26ebc5d344ffb1a8778a1e541f87.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\del1065.bat
      2⤵
      • Deletes itself
      PID:1332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\del1065.bat

    Filesize

    395B

    MD5

    76e61fbb9282c527e145ecaa148a3f48

    SHA1

    00c008d3c136802e6c0aa67090bacf25290deea6

    SHA256

    6c9a900990fefa50fc09e98f70a0f7027327926041cdb1444f549afe2c025876

    SHA512

    27484489f907f6488141643f82de853731f7cee453cd385aa04c320e11de17cacedb9cdad6284daad8bd3044439dbb3c10b79d2fcd48eb7bf5a9c556ef3eccf9