Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 21:59

General

  • Target

    b121451d206c73608640ef8c84db7204335f54947cff3e89df3c7de7cd3a6a27.exe

  • Size

    414KB

  • MD5

    6da763f39780f530ccc0e29bcebc7b81

  • SHA1

    86dd169e13dab9cb475bd0dc3a8ab17145b9e3c8

  • SHA256

    b121451d206c73608640ef8c84db7204335f54947cff3e89df3c7de7cd3a6a27

  • SHA512

    b64420f0b95dc5e7b651a435f92c9b8eccd5761b70ba2f5faba82439bcaf07d44684cbaecf4f406470cce5f0db8215f6112a7459827954271855109bb19f0f3a

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b121451d206c73608640ef8c84db7204335f54947cff3e89df3c7de7cd3a6a27.exe
    "C:\Users\Admin\AppData\Local\Temp\b121451d206c73608640ef8c84db7204335f54947cff3e89df3c7de7cd3a6a27.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:1848
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:4260

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      086753be1cf905080824e8e45c0e2212

      SHA1

      6b68981c031206765feba5c898de838253de4b12

      SHA256

      961eb9592099261eede6622bfa13f9b8088dc0b133e593f99e491783fd8065b9

      SHA512

      d3a44ad088584e74d3f4de362514ce1fe132f7a3190068d003bbdeb58588085dd7caa191eeeb953d45133068963b0e4a79ad6e5a205854b7edb98ce2dfc29bb5

    • memory/1828-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1828-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1828-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB