Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    16-05-2022 05:11

General

  • Target

    6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe

  • Size

    1.6MB

  • MD5

    d644eb3560601aa504917b281306a350

  • SHA1

    b43554ea4fa8eed7a9d36e4172546487b627a45d

  • SHA256

    6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8

  • SHA512

    c9a2100bd23d583d63c5fd37251b81407036f422d5cdcf2386419d78eaf25fbf2fa7bc6d34ef33f2b427ead5004ce92da9184a70d5c202d2dcb12571b403fc46

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe
    "C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4572
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "mkdir %userprofile%\SystemApps"
      2⤵
        PID:3532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /C "copy C:\Users\Admin\AppData\Local\Temp\6dfb9490b10f90cfb5c0b7f2db24bc0eb3924664540ac24d5a1b32a4614078f8.exe %userprofile%\SystemApps\AppSrv.exe"
        2⤵
          PID:5032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "attrib +H %userprofile%\SystemApps"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Windows\SysWOW64\attrib.exe
            attrib +H C:\Users\Admin\SystemApps
            3⤵
            • Views/modifies file attributes
            PID:4776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /C "REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D %userprofile%\SystemApps\AppSrv.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4496
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V SystemApps /t REG_SZ /F /D C:\Users\Admin\SystemApps\AppSrv.exe
            3⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:4296

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Hidden Files and Directories

      1
      T1158

      Defense Evasion

      Modify Registry

      2
      T1112

      Hidden Files and Directories

      1
      T1158

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1364-132-0x0000000000000000-mapping.dmp
      • memory/3532-130-0x0000000000000000-mapping.dmp
      • memory/4296-135-0x0000000000000000-mapping.dmp
      • memory/4496-134-0x0000000000000000-mapping.dmp
      • memory/4776-133-0x0000000000000000-mapping.dmp
      • memory/5032-131-0x0000000000000000-mapping.dmp