Analysis

  • max time kernel
    128s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 18:13

General

  • Target

    02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe

  • Size

    613KB

  • MD5

    73adf635b8451e53c07fdd816e5f46f7

  • SHA1

    f0425273d75979c13ab985ea431a1ca7d1ea3558

  • SHA256

    02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10

  • SHA512

    15bc29b1647db147e912218d0c8b60150e03b8d43dec3088594385914766d5dc68d1a1b3dce242c99541f88033f595f802bf5a1f3eb89590e1079f4192dbf993

  • SSDEEP

    12288:UsAqMGHGSX1388BxGVILSY4oSe8lUz7iTuZ13/f46Dv13GNBlq3eaBl8M:UsBbWOSY4He8K76uZKMv13Grlq3hBlP

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe
    "C:\Users\Admin\AppData\Local\Temp\02e2a8310f697864345966490f1ea9db48ec8ab1de9b6d8b69c5bb43c8921b10.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\concp32.exe

    Filesize

    618KB

    MD5

    87dde94d210cddb5dc3418db31d94941

    SHA1

    29c655f1efab4a11b9a6831bcc243c6840b0ee12

    SHA256

    3f691cac3540225d03a61d3b42a1f4e40660f01de57def5df87071c942e9ae78

    SHA512

    0eca20dadaf7d3434e61edec1c710ad104af0de2ed2ddfeea3ca691e418efaeeef7dd27652ef244d71e3bb8cb7ad3a4a39d237c17ae61e76bbb8dd7a0ff23110

  • C:\Windows\spoolsv.exe

    Filesize

    618KB

    MD5

    0b9a6065f27ec79eca26d2d23a0ed5af

    SHA1

    6c3dfcf5f1086543a3732c719d8642a68a7ff315

    SHA256

    3bdccd66a49f6299a0077b2709882e293e80b8bfa2cd70492ed7e0d02ea329ac

    SHA512

    f34f067effea9f3cf7c6dfd92593cd26803808acfd23a36574fe1a09edf3d53a96a624a47ccbbf3d35f7bc8f2464989a23efccf87a0a994d7215c12a46f74209

  • memory/1864-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1864-10-0x0000000000220000-0x0000000000255000-memory.dmp

    Filesize

    212KB

  • memory/1864-15-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1864-16-0x0000000000220000-0x0000000000255000-memory.dmp

    Filesize

    212KB

  • memory/2708-17-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB