Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 04:44

General

  • Target

    c7b8c224a6cabae31557182788f7442a.exe

  • Size

    440KB

  • MD5

    c7b8c224a6cabae31557182788f7442a

  • SHA1

    b87bba5303a93b2f7d41037e864d81c208e955b8

  • SHA256

    73eab7c739e178ac84370b78bcc5b969c693637144ae25ba56895a6ce28bc9db

  • SHA512

    149db0b4a49f7234d1061b896f305da80abde917923b860bb1dc390952fbf3ee3609ae63150d10e6d0c273bbc48c46ce721aadb1a5be3a1429e49f8a7b9a5f26

  • SSDEEP

    12288:tHM3/vAAOhOnYlPyeuKuUmNMt5wDUVDdFo:tHMvvA7OYGUke5HVDY

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe
    "C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe
      C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe
      2⤵
      • Adds policy Run key to start application
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2440
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\c7b8c224a6cabae31557182788f7442a.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2288
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2724
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\data.dat

          Filesize

          33B

          MD5

          821f48fdc9e572c433b3e78f3a829a75

          SHA1

          296fc1bb4a652daa7a2412744b40554a2406f989

          SHA256

          d73f1175aff90570f4701aba0805c26062b71a245e32ef76d8b68c4f6ba291bc

          SHA512

          3e0c8a9d70af01dc0161796b8735b4e30001df3543b35dc5d3c3c2a8020b00202ff5d5ab609422f6a538305a3ec7da305683ac45124bf75163b6d6e91380612c

        • C:\Users\Admin\AppData\Roaming\svchost.exe

          Filesize

          440KB

          MD5

          c7b8c224a6cabae31557182788f7442a

          SHA1

          b87bba5303a93b2f7d41037e864d81c208e955b8

          SHA256

          73eab7c739e178ac84370b78bcc5b969c693637144ae25ba56895a6ce28bc9db

          SHA512

          149db0b4a49f7234d1061b896f305da80abde917923b860bb1dc390952fbf3ee3609ae63150d10e6d0c273bbc48c46ce721aadb1a5be3a1429e49f8a7b9a5f26

        • memory/1908-18-0x0000000075ED0000-0x0000000075F70000-memory.dmp

          Filesize

          640KB

        • memory/1908-19-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-14-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-15-0x0000000074CC0000-0x0000000074DD0000-memory.dmp

          Filesize

          1.1MB

        • memory/1908-16-0x0000000075ED0000-0x0000000075F70000-memory.dmp

          Filesize

          640KB

        • memory/1908-17-0x00000000770A1000-0x00000000770A2000-memory.dmp

          Filesize

          4KB

        • memory/1908-2-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-8-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-22-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-24-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-28-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-30-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-32-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-4-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-34-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB

        • memory/1908-36-0x0000000000400000-0x0000000000467000-memory.dmp

          Filesize

          412KB