Analysis

  • max time kernel
    90s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 06:57

General

  • Target

    9298ef441e49fee8c1b28f899d83a8392a41a5f6a88c5db12cf17658e886cf5a.exe

  • Size

    864KB

  • MD5

    56b829129dab2ccd25ab65f2f9cc19f0

  • SHA1

    99de7ab4266a4cc71d60b52f43487f6aa8e29228

  • SHA256

    9298ef441e49fee8c1b28f899d83a8392a41a5f6a88c5db12cf17658e886cf5a

  • SHA512

    42144565c457c1d300cf7f139cbc2b0cfc561979b1a1db3dc55d67c4317f9659f8a79bd52b78929e5094dc2a759250198ebc3f673d30e4b2773529e022501aa7

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9298ef441e49fee8c1b28f899d83a8392a41a5f6a88c5db12cf17658e886cf5a.exe
    "C:\Users\Admin\AppData\Local\Temp\9298ef441e49fee8c1b28f899d83a8392a41a5f6a88c5db12cf17658e886cf5a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3296

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            26662d11e0b7940b2c5a2b3d4f7ff99b

            SHA1

            9c3ad791dc7119a8eecbee6d5931e0b6478c027b

            SHA256

            38f9ff1867d6f0f1e01a032ac1c5aeebc75d2480601c3d905f7bcc04e1da0460

            SHA512

            192af96863507bebe2ad767a6e773db433efa6f915d802e3a4eef819752e0dabdddfb3bd33c06d78c52dd849da75e19ccd8bce4962eb8e2ca71f88d2f305198c

          • memory/4024-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4024-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4024-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB