Analysis

  • max time kernel
    152s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 21:54

General

  • Target

    4bf12d36b0061804153c4fb48a8bfbfa096c797c483a3d4275608e2c93ae0c29.exe

  • Size

    857KB

  • MD5

    09bec53b21d668c5c8fa92fb57ada600

  • SHA1

    be11497875be6449c91ab286645a3963d3e8f172

  • SHA256

    4bf12d36b0061804153c4fb48a8bfbfa096c797c483a3d4275608e2c93ae0c29

  • SHA512

    282fc1988d0f19113e492b78fd5910a05cea21dd851c510dfe5cdb56d2845dfd7884a53c795a264b0e598641dae5be8805f7ca3e0423bce9d4ea077060d8dac7

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bf12d36b0061804153c4fb48a8bfbfa096c797c483a3d4275608e2c93ae0c29.exe
    "C:\Users\Admin\AppData\Local\Temp\4bf12d36b0061804153c4fb48a8bfbfa096c797c483a3d4275608e2c93ae0c29.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      2aa796b582983de1332330a87bfbbbf7

      SHA1

      359e45e03ed12562d3229edc7378e465b7e991a6

      SHA256

      9b6552c1f57121aff9095d4aabd98879ed5eb4c3fe3dc3d19a17ebcad699e300

      SHA512

      64aafea4b9108e25d9da808da3cbbecc6c68c1524c370b1ca3c2524c2608c100e238bbe866fdc21787276957f8c3cc7e2241eace0cef544c56d50d6e7343913b

    • memory/4900-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4900-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4900-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB