Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-06-2022 03:39

General

  • Target

    117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe

  • Size

    100KB

  • MD5

    be04880708661c10c6dc83b9adc83756

  • SHA1

    942e64204031981a9861e2ae90e7c296eeac1519

  • SHA256

    117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218

  • SHA512

    83bd19290de0acef2fdec699dda973479d8896fbcb920e2aecdc31405839019ac30d749afc148313a851de17a7b56440ec8156098d0d839a7374648c359408db

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe
    "C:\Users\Admin\AppData\Local\Temp\117cec9b90336e72a71d8fa9c67e5f58ba0ae90e33a19805a6f4a36a50d68218.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
      2⤵
      • Executes dropped EXE
      PID:2304

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
    Filesize

    45KB

    MD5

    ad090589116ae6ba1efb9d09ec7fb098

    SHA1

    f9efe2e2591204800787907583a88b2a87348b49

    SHA256

    5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

    SHA512

    37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSNMSG~1.EXE
    Filesize

    45KB

    MD5

    ad090589116ae6ba1efb9d09ec7fb098

    SHA1

    f9efe2e2591204800787907583a88b2a87348b49

    SHA256

    5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18

    SHA512

    37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3

  • memory/2304-130-0x0000000000000000-mapping.dmp