Analysis

  • max time kernel
    135s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 02:46

General

  • Target

    fc47491c59dbd8a8bbc245fcd64e28c5936bae5e0ca9554af714240dcc69a17f.exe

  • Size

    1.7MB

  • MD5

    954474c2d39e30cfa300ab3135bb3fec

  • SHA1

    64bcc05ef8ab5a41906f50d60412466f25ee16b1

  • SHA256

    fc47491c59dbd8a8bbc245fcd64e28c5936bae5e0ca9554af714240dcc69a17f

  • SHA512

    f5cfcfeea4140acb19a75080cce0d207ddccac0757b0db0abf93fbcf0bf90cea73cfe5d47388eb38e87578c66a03fae59066a5e8af4407f78026e5088fbf3820

  • SSDEEP

    49152:Aa3V/QzJw+3LtyVL6bJ5z1ZVZ/w3Rnia0A7UKXiA:n3V/QdwO4L6FdwBi0DSA

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Detects executables built or packed with MPress PE compressor 4 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc47491c59dbd8a8bbc245fcd64e28c5936bae5e0ca9554af714240dcc69a17f.exe
    "C:\Users\Admin\AppData\Local\Temp\fc47491c59dbd8a8bbc245fcd64e28c5936bae5e0ca9554af714240dcc69a17f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX935C.tmp

    Filesize

    95KB

    MD5

    aa42d8980e5750941eabf338ae6e1467

    SHA1

    f962ae910c33e68daff3064d5fe9f595744a0a63

    SHA256

    f79ed89e3d630aa09e105a98a66aff8532b2caf3cdc0c00346912ab88e5cf4f8

    SHA512

    6dbec3d3d91f267d3551ba50b9c193635e8200d8393f85512965399c5ac4ba04eb4b2f6ecd671977dab6193f2873435ca381acb696187dd353618f2055e0b5de

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    1.7MB

    MD5

    c902c6d92346301249c2c1ca9214b731

    SHA1

    ec1c0c60bd5871d3fbc50f2273dbe5f546202c80

    SHA256

    db5842a51a5bbb4a5fe5fa85894d017b6b07b0e6777caf4ff091f81e11f36d5f

    SHA512

    6fea66ed5e70db4e0d3ffca5b97ddda2b639da0073456a1412d24559b9b64592ff463f4a6c97b2e5146c03673b3a2aa33faa45527314637d5d9db9d6b6f66a12

  • memory/2712-0-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB

  • memory/2712-127-0x0000000000400000-0x000000000041A000-memory.dmp

    Filesize

    104KB