Analysis

  • max time kernel
    103s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 21:59

General

  • Target

    d5b1c49ba24e777626ca7ff3c4f5681753153054cc92b3db1139d07b6b39abed.exe

  • Size

    758KB

  • MD5

    65aded6ead118d77aeac15573c31e4ed

  • SHA1

    b8002557a064a8ba59942bcefe5c0273cbd9ad1c

  • SHA256

    d5b1c49ba24e777626ca7ff3c4f5681753153054cc92b3db1139d07b6b39abed

  • SHA512

    0bb58e15f7eed332c58ddf2433a01a4d6a1481159befeb756f488f7e6f5569e174c56ef51a4ccc258ecdf8e6264279b3e830da563ec1045905aeca253ae47a60

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5b1c49ba24e777626ca7ff3c4f5681753153054cc92b3db1139d07b6b39abed.exe
    "C:\Users\Admin\AppData\Local\Temp\d5b1c49ba24e777626ca7ff3c4f5681753153054cc92b3db1139d07b6b39abed.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3108

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            fcd6ae346b64eb19865185f9278081d8

            SHA1

            c388285d04a2fc949a5b88829e3a9e0c95ae9dee

            SHA256

            051e946bca9db31d534ad67a1f67c7ea8fb3d7b098503926703a815f188eb2e7

            SHA512

            f83d152ddde5d8ecce0c6a34b6baabff26ad7d62f9871798369487ce50aee4d7feda8bc54310d2825c25d4f4d92b1a2362beada3074db2cae80222338b204767

          • memory/4648-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4648-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4648-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB