Analysis

  • max time kernel
    156s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 05:40

General

  • Target

    a306f39167be600a2d922ed34ed30629.exe

  • Size

    108KB

  • MD5

    a306f39167be600a2d922ed34ed30629

  • SHA1

    028e2a781e826efe4574f4b6af8a2cfe61241944

  • SHA256

    f5069d0b0fa7605b432507107ad6d37ec8cd54c3ff8dd7f33d5d8bb027967351

  • SHA512

    3660578df6904b448426c81ffeb3e4ac25721b7c35bfc19eff0ce82fff20910e96c8dc4b0396cd4db57734f090bbb97c36c67331723c0cd955f3a4c7206dbabe

  • SSDEEP

    1536:4aiqH1s+kCtrA2UMT0mTFibDKa1XE1MeL/pc4/MrcE06xWhnTJVLwIk:51B31bdBob2QXG63rrdMdtI

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a306f39167be600a2d922ed34ed30629.exe
    "C:\Users\Admin\AppData\Local\Temp\a306f39167be600a2d922ed34ed30629.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXC2E4.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe

    Filesize

    108KB

    MD5

    a306f39167be600a2d922ed34ed30629

    SHA1

    028e2a781e826efe4574f4b6af8a2cfe61241944

    SHA256

    f5069d0b0fa7605b432507107ad6d37ec8cd54c3ff8dd7f33d5d8bb027967351

    SHA512

    3660578df6904b448426c81ffeb3e4ac25721b7c35bfc19eff0ce82fff20910e96c8dc4b0396cd4db57734f090bbb97c36c67331723c0cd955f3a4c7206dbabe

  • memory/1500-101-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-102-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-97-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-98-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-99-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-100-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-28-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-96-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-103-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-104-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-105-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-106-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1500-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB