Analysis

  • max time kernel
    0s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 02:46

Errors

Reason
Machine shutdown

General

  • Target

    960b00beae77c1fd766e8ee3457abeae.exe

  • Size

    92KB

  • MD5

    960b00beae77c1fd766e8ee3457abeae

  • SHA1

    6a7044fcde5955a200004aaa6b85c11b28193b67

  • SHA256

    a3e943ae1ac097be1f2284e65231112908a2a7d9f5ba46e041529b0a972ff938

  • SHA512

    9ad91f76e578292b6c0f38a398fbc96641755666e557d4243199487f7bd4a67d3f3dd243902a6eceb2004c44e1cd0cd3e3936a7c42bee01d80f1e02479ed4065

  • SSDEEP

    1536:ZGonN4UuBKrmBF3rQgvPKXnDYRa1l66gX9H7Mj2eQyfXUZJ3okHcSAvQKOD:pN4FB7jFKXD0d6gX1oSet6zH9

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\960b00beae77c1fd766e8ee3457abeae.exe
    "C:\Users\Admin\AppData\Local\Temp\960b00beae77c1fd766e8ee3457abeae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 3223028482 /t REG_SZ /d "%userprofile%\3223028482.exe" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 3223028482 /t REG_SZ /d "C:\Users\Admin\3223028482.exe" /f
        3⤵
        • Adds Run key to start application
        PID:3052
    • C:\Windows\SysWOW64\shutdown.exe
      "C:\Windows\System32\shutdown.exe" /r /f /t 3
      2⤵
        PID:2160
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\960B00~1.EXE > nul
        2⤵
          PID:2556
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:2472
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:2460

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2460-6-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

            Filesize

            4KB

          • memory/2472-5-0x0000000002D90000-0x0000000002D91000-memory.dmp

            Filesize

            4KB

          • memory/2936-1-0x0000000000120000-0x000000000012F000-memory.dmp

            Filesize

            60KB

          • memory/2936-2-0x0000000000130000-0x0000000000138000-memory.dmp

            Filesize

            32KB

          • memory/2936-3-0x0000000000F40000-0x0000000000F5C000-memory.dmp

            Filesize

            112KB