Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 23:33

General

  • Target

    88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe

  • Size

    196KB

  • MD5

    16520eeb2cfc9bf7b596ae3b97f89e55

  • SHA1

    2954c6eb1ec0b36e38a694c19c2f20a097fe0653

  • SHA256

    88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968

  • SHA512

    25764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53

  • SSDEEP

    3072:q7k0QpFZyOSAYZRx6iDrhLOUpHCvvFM1icGJbeiy8JpQG2AysGtFLx6lmJbei:q7k0lrTivFMAcGUVQiAyxclmU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe
    "C:\Users\Admin\AppData\Local\Temp\88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\reg.exe
        reg add HKCU\software\microsoft\windows\currentversion\run /v Updates /t REG_SZ /d D:\Updates.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2572
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\reg.exe
        reg add HKCU\software\microsoft\windows\currentversion\run /v Backup /t REG_SZ /d D:\Backup.exe /f
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Low\Low.exe

    Filesize

    196KB

    MD5

    16520eeb2cfc9bf7b596ae3b97f89e55

    SHA1

    2954c6eb1ec0b36e38a694c19c2f20a097fe0653

    SHA256

    88527f7ea4e24eeef654e6a7fe19a701ddc840921b9b8f169ad94f8a87ab8968

    SHA512

    25764751734c2f14c61b0d27279436978dd06c668e6914e0a9dedb1ec36fec18ea5706d98eb15716454c3bc15f7e5a8e0c8b20befd009e2eed2137c3c0d6fb53

  • memory/2624-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2624-21-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB