Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 20:58

General

  • Target

    c6d7b92886b5c6151b0328e2e7be0aca.exe

  • Size

    61KB

  • MD5

    c6d7b92886b5c6151b0328e2e7be0aca

  • SHA1

    f1d55d78b77ca248baedbc4367cc067d6899a096

  • SHA256

    f4438cf27a37b3bf6be7e04cce6bc45e63eed86c95871142d35e3d27c036feef

  • SHA512

    44b65cb6dcc699450432cb09f244b5989620e574933b9f3ee2e39505459f29cae15203cf5c63cf78f59c20c40eb5071027b8e1bafc31b8597713f37f3c267608

  • SSDEEP

    1536:erj+8ZkVYa0tMId2MzdOTunQF+wyoCYNUOIyAFXZ/E9dzB4:ef+wkVYa+5/AanQVtYyAZZ/8dF4

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6d7b92886b5c6151b0328e2e7be0aca.exe
    "C:\Users\Admin\AppData\Local\Temp\c6d7b92886b5c6151b0328e2e7be0aca.exe"
    1⤵
    • Looks for VMWare Tools registry key
    • Drops file in Windows directory
    PID:1640
  • C:\Windows\aolsoftware.exe
    "C:\Windows\aolsoftware.exe"
    1⤵
    • Modifies security service
    • Windows security bypass
    • Looks for VMWare Tools registry key
    • Deletes itself
    • Executes dropped EXE
    • Windows security modification
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\aolsoftware.exe

    Filesize

    61KB

    MD5

    c6d7b92886b5c6151b0328e2e7be0aca

    SHA1

    f1d55d78b77ca248baedbc4367cc067d6899a096

    SHA256

    f4438cf27a37b3bf6be7e04cce6bc45e63eed86c95871142d35e3d27c036feef

    SHA512

    44b65cb6dcc699450432cb09f244b5989620e574933b9f3ee2e39505459f29cae15203cf5c63cf78f59c20c40eb5071027b8e1bafc31b8597713f37f3c267608

  • memory/1640-1-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1640-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1640-2-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1640-8-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-7-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-9-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-12-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-15-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-18-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2172-21-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB