Analysis

  • max time kernel
    110s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 19:42

General

  • Target

    d17dca782e1133f8cc73cbbf1728a8cffd817799ae6aa3e69322a33653d36f95.exe

  • Size

    703KB

  • MD5

    059df1d51ea0aee112dcfc05f1f14956

  • SHA1

    dafafcfd314ea59c3ff5e3c0c2a0633a7ab6e03e

  • SHA256

    d17dca782e1133f8cc73cbbf1728a8cffd817799ae6aa3e69322a33653d36f95

  • SHA512

    a5650496a5ee64a26acbefe4bfd3dda470a4bc080af94d663b97acc7979ee4dffacf3e8f4f6feff75edca709f1833916069fc8574264998623f9c7fb83d17a8d

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d17dca782e1133f8cc73cbbf1728a8cffd817799ae6aa3e69322a33653d36f95.exe
    "C:\Users\Admin\AppData\Local\Temp\d17dca782e1133f8cc73cbbf1728a8cffd817799ae6aa3e69322a33653d36f95.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      db8cad47406fc511b9fba5a842f8a3ec

      SHA1

      b208a66658ecfd75eb0d0c57dab0738256617143

      SHA256

      30bea5ff0276e5c5e6d5aa4cf4ba9c7b85671513db5e70275136c76228865d32

      SHA512

      502f89dde3f911a13cd5c3a6f372363959f00cb55d0608c0d448130c78f28424ea0fc0a1d60ac4baad729426d21f22cfaaa068baba56d4084bd10689caeaf09e

    • memory/804-134-0x0000000000000000-mapping.dmp

    • memory/1684-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1684-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1684-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB