Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 19:40

General

  • Target

    03b55c37bc20214791cae3943077ee7c3cf22972353262ebbceeeddc81fd5c20.exe

  • Size

    334KB

  • MD5

    8f242f75b08b567eb82c888edcf61843

  • SHA1

    f046c1d103d27646c62056a20270758346d4e579

  • SHA256

    03b55c37bc20214791cae3943077ee7c3cf22972353262ebbceeeddc81fd5c20

  • SHA512

    65db8049fa2ee173aca958e1fdb5ebdf5e0f922fa0772079306a9a7b31a9ee333fc3bb27cf56b8aa6869f6b80d5b78266ce597bf3095909c88e214d29ba18c53

  • SSDEEP

    6144:MRAhhJxX7bNIFlJRUI8ejZpY8IhUY6FsjtMXSWEOIhQTJDYH1rMYoLswkXllX:UsA1mIRjZp9IyTFCMXSWEOIsYHCsVJ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03b55c37bc20214791cae3943077ee7c3cf22972353262ebbceeeddc81fd5c20.exe
    "C:\Users\Admin\AppData\Local\Temp\03b55c37bc20214791cae3943077ee7c3cf22972353262ebbceeeddc81fd5c20.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\spoolsv.exe
      C:\Windows\spoolsv.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      PID:3000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\concp32.exe

          Filesize

          341KB

          MD5

          86ea9fb034f754b50b658b957e905a1e

          SHA1

          051b34891c9ce81fbec5daea0c3e7dfce04a500d

          SHA256

          8bf5c5cce0561824b4f0080626bebc39135fe83b38d9f5aa2899e3cf7529ae60

          SHA512

          abfd41b6ca67d05800644d74cf5f80864af1edc86837e85912a69e922f912049ec66a2fd1b2d97f80676e47e2c73a12b8e4a5b1bcce6670eaa98f30625a53bb6

        • C:\Windows\spoolsv.exe

          Filesize

          337KB

          MD5

          288e2a3389b40546362830153cbabb9e

          SHA1

          b532c1e07e3e575a9803f92b84f868d0e9afd9a7

          SHA256

          6078bd66f4e8fae81f7c612a0f62e04ef3668a152ba0be7e73ec750c9420e979

          SHA512

          15afce6c5e5290eec7ad65c42e406244b02cb6f931d795eef07c941fae89c3ffff182cc82c78b54610afb482c7088cebd16f271077ca00f8e34b503e313decf4

        • memory/1716-0-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/1716-10-0x0000000000440000-0x0000000000475000-memory.dmp

          Filesize

          212KB

        • memory/1716-14-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB

        • memory/3000-16-0x0000000000400000-0x0000000000435000-memory.dmp

          Filesize

          212KB