Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 23:28

General

  • Target

    c4619df89b2b62633cfe6e57102f009c.exe

  • Size

    26KB

  • MD5

    c4619df89b2b62633cfe6e57102f009c

  • SHA1

    3e9ffe82d66d744aa05e26c341de7030ec9c40de

  • SHA256

    22d23f4c631d6f4f6f8d5877c510133927dd22ee986e676537a73b035083246a

  • SHA512

    451b9b7cef9a359bc367c1a7f334d5dfdea38f74185971096f779aacae64d1e5c462e6324eee2007c2861c62ef73bdbb6a87abb101efc387b1fc20e890966f77

  • SSDEEP

    384:/iLNydwMlIu8c/ZsgrtOL5Rrjv6ufzVyrBYfiVwTkQgP:/iL0dl+GagrevIrBiiVhP

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4619df89b2b62633cfe6e57102f009c.exe
    "C:\Users\Admin\AppData\Local\Temp\c4619df89b2b62633cfe6e57102f009c.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Deletes itself
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-5-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

    Filesize

    32KB

  • memory/2040-4-0x0000000000CE0000-0x0000000000CE8000-memory.dmp

    Filesize

    32KB

  • memory/2040-9-0x0000000000030000-0x000000000003C000-memory.dmp

    Filesize

    48KB

  • memory/2040-10-0x0000000000030000-0x000000000003C000-memory.dmp

    Filesize

    48KB

  • memory/2040-11-0x0000000000080000-0x0000000000084000-memory.dmp

    Filesize

    16KB

  • memory/2040-12-0x0000000000030000-0x000000000003C000-memory.dmp

    Filesize

    48KB

  • memory/2040-15-0x0000000000030000-0x000000000003C000-memory.dmp

    Filesize

    48KB

  • memory/2176-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2176-1-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/2176-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2176-3-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB