Analysis

  • max time kernel
    90s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2022, 21:56

General

  • Target

    d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe

  • Size

    26KB

  • MD5

    1628254a2a0e1ad9160f0f263e51d7d2

  • SHA1

    123a768be7656a2673c90fe58e3a04e8836e6304

  • SHA256

    d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

  • SHA512

    f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

  • SSDEEP

    384:DZyrOAVI7cfceEAQ1uLsH7tns5NxTwnstZ0rlDPBdrhMIQ0crqBCDS5oqGAEjpeV:DZJAGc3EdQC5nST9ihBMfryC25oIOZS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe
    "C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:392
    • C:\Windows\SysWOW64\NTdhcp.exe
      C:\Windows\system32\NTdhcp.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:1852
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\Deleteme.bat
      2⤵
        PID:1696

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Deleteme.bat

            Filesize

            248B

            MD5

            ab65f0325b59c2e2ceb5e8e23334b049

            SHA1

            b13e360c7786ba00083a33f5e0c3acdffff84b43

            SHA256

            ff02e03f62d627c463c59f376a19bb849994c674609e2f54481aef2ce61d9c1d

            SHA512

            0fbd5a577ebb6840bd4abbf8c59728226bfd4a397752f227e4646ceed61ac80038db72af95589b07a0d5700c724b58ff736955110d807394cb0843897cef6252

          • C:\Windows\SysWOW64\NTdhcp.exe

            Filesize

            26KB

            MD5

            1628254a2a0e1ad9160f0f263e51d7d2

            SHA1

            123a768be7656a2673c90fe58e3a04e8836e6304

            SHA256

            d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

            SHA512

            f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

          • C:\Windows\SysWOW64\NTdhcp.exe

            Filesize

            26KB

            MD5

            1628254a2a0e1ad9160f0f263e51d7d2

            SHA1

            123a768be7656a2673c90fe58e3a04e8836e6304

            SHA256

            d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

            SHA512

            f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

          • memory/392-132-0x0000000000400000-0x0000000000416200-memory.dmp

            Filesize

            88KB

          • memory/392-138-0x0000000000400000-0x0000000000416200-memory.dmp

            Filesize

            88KB

          • memory/1852-136-0x0000000000400000-0x0000000000416200-memory.dmp

            Filesize

            88KB