Analysis

  • max time kernel
    91s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 06:57

General

  • Target

    8358116635f39d30b97150bb0cf8d3b0dbe131a9bcb75b1bc68af02932c66ec7.exe

  • Size

    461KB

  • MD5

    69728446c25263e5d5f901670e58bcb0

  • SHA1

    0bdc1242eb3fd6e9ac69d7b75750678dd278f0dc

  • SHA256

    8358116635f39d30b97150bb0cf8d3b0dbe131a9bcb75b1bc68af02932c66ec7

  • SHA512

    af00dc437bca91c6991f0c8bd7aadc12e04649564f3cf4b9cee25c844a48e64a5c13bb132900a97a34f8e20e2636b85c03c7901fb043d74bfa56905b2d3d6684

  • SSDEEP

    3072:7+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNV:aZmqt6Qyiy3b6CR10TY8JOArF9S9x

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8358116635f39d30b97150bb0cf8d3b0dbe131a9bcb75b1bc68af02932c66ec7.exe
    "C:\Users\Admin\AppData\Local\Temp\8358116635f39d30b97150bb0cf8d3b0dbe131a9bcb75b1bc68af02932c66ec7.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      5035024ec2920d7acea141cd43f00ec3

      SHA1

      f45c41cd80cfc7b619b72fe2e3409c6e18b6fbbd

      SHA256

      65afd8ddd52a97457298f533dc89c35661457e581aad6f5bb457b67f62cefc69

      SHA512

      aa3d3bf748fc4f6c194417ec2fadab031b629ae4a63606ee23716ab00bb2150e3aecb7575b39fd03170684de28371672cb1bff1f9f94ccf7e001cec35b7f65fb

    • memory/920-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/920-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/920-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB