Analysis

  • max time kernel
    92s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 20:50

General

  • Target

    8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe

  • Size

    100KB

  • MD5

    e52c395049d59efaf2515b0ed7f555c4

  • SHA1

    0a765a7b624f6d84909320cdd4f9a083fa117833

  • SHA256

    8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9

  • SHA512

    e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122

  • SSDEEP

    3072:SBdUWd+EidEJTklav8i4zQsZlTNO6wsB+ovK7WKIRn34N6fvCX:SsWd+NdE4hZxsQB+iK7Ql34sHC

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe
    "C:\Users\Admin\AppData\Local\Temp\8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\594C.exe eee
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\SysWOW64\594C.exe
        C:\Windows\system32\594C.exe eee
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4908
    • C:\Windows\SysWOW64\C484.exe
      C:\Windows\system32\C484.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\594C.exe eee
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\SysWOW64\594C.exe
          C:\Windows\system32\594C.exe eee
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8YLPV06K\OFD91FCE.htm

    Filesize

    354KB

    MD5

    f774d1b0ee0783b7a6617597219101b5

    SHA1

    f89b631e765139b7821475f181ff5a2f310a2e13

    SHA256

    e39bb0e35b90c993aefdb013e8924243d4a0430623b1a00464da12085a1a4198

    SHA512

    c949fef9b0eeaa45d74501849ebb1bfaf4b54a3da873837c9aa8dae9e1e8d89c89d0c71fd3743ea1f0de852beff28f44c4fea9a0d51ffb4e9914fc49ca6181cf

  • C:\Windows\SysWOW64\594C.exe

    Filesize

    108KB

    MD5

    8cfd59ac42287fd6ceb2ca03a0eeab23

    SHA1

    9d4f662f093093acb151dda39e2bcbc5dac8bdc9

    SHA256

    bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb

    SHA512

    8433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485

  • C:\Windows\SysWOW64\594C.exe

    Filesize

    108KB

    MD5

    8cfd59ac42287fd6ceb2ca03a0eeab23

    SHA1

    9d4f662f093093acb151dda39e2bcbc5dac8bdc9

    SHA256

    bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb

    SHA512

    8433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485

  • C:\Windows\SysWOW64\594C.exe

    Filesize

    108KB

    MD5

    8cfd59ac42287fd6ceb2ca03a0eeab23

    SHA1

    9d4f662f093093acb151dda39e2bcbc5dac8bdc9

    SHA256

    bbafeae609d14f173e3b11715a32e626d73651c4d193772b19df62dc551f8fcb

    SHA512

    8433452fb3dd4b87915efd1fffa1643010c786d28bab38ca2ac6e99e66d9f1cf5585ebc0d05aa77549011505aa8e0ad83acfadd954c225aef23da2bed3c19485

  • C:\Windows\SysWOW64\C484.exe

    Filesize

    100KB

    MD5

    e52c395049d59efaf2515b0ed7f555c4

    SHA1

    0a765a7b624f6d84909320cdd4f9a083fa117833

    SHA256

    8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9

    SHA512

    e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122

  • C:\Windows\SysWOW64\C484.exe

    Filesize

    100KB

    MD5

    e52c395049d59efaf2515b0ed7f555c4

    SHA1

    0a765a7b624f6d84909320cdd4f9a083fa117833

    SHA256

    8f70a086699bb604ae5a56a8f7537980e4716071ff5402e8aaf068c7b769e9c9

    SHA512

    e517592f85bb400e6f684987726e09d121b1f81fbe3ba42e78c7a1b94bb25d587e0044a7bdff2178f2c2bdce926733d9718c03e39ea9d706bca998c5f465b122

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

  • memory/2296-150-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2296-158-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2500-133-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2500-157-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB