Analysis

  • max time kernel
    157s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 22:52

General

  • Target

    06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f.exe

  • Size

    45KB

  • MD5

    77bbb5d86a3f66702452bf5c66a38490

  • SHA1

    a7092874e09a407303589a64c8dc5ba5af770863

  • SHA256

    06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f

  • SHA512

    d33b4a144fe02cdad6352e60108dd26026a23fe4a7e664b0097b01d9cfdec2f16e5b26b9dd2a9a9ddee261bc04ca072399b27fd235c415fd2feaa443b06b9f1e

  • SSDEEP

    768:2nFbeItJvR+Argv75ZmqPL2adWfwlmAa6BWRzAZ4qb1nYvSRwAicFoNJX1Z:2FbeITsAro5ZNjzFmAa6IBA2oESRzic8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f.exe
    "C:\Users\Admin\AppData\Local\Temp\06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:1820
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devED24.tmp!C:\Users\Admin\AppData\Local\Temp\06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\06C39FEFEC146E5CFF15EB739EA0E63796F6EBD52BDA5DB2ECB6966CC4422B9F.EXE
        3⤵
        • Executes dropped EXE
        PID:1640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\06C39FEFEC146E5CFF15EB739EA0E63796F6EBD52BDA5DB2ECB6966CC4422B9F.EXE

    Filesize

    5KB

    MD5

    2c6eae9be4207d9b385b11b1bfd7d055

    SHA1

    41e389a4408578284bd5aba43da770a296067be0

    SHA256

    c07bc8e6d2c80e18c98fca41752969f2faa7857baf510bfae6b48a80356c8ae3

    SHA512

    e73911d5772128e2ea9c8b14190ab4f947bb77417b4acc707e79d9898a51c7e8c884e64d4e229cb7adec2409f4774ac63a6f30ba19027d3f02274b190131323a

  • C:\Users\Admin\AppData\Local\Temp\06c39fefec146e5cff15eb739ea0e63796f6ebd52bda5db2ecb6966cc4422b9f.exe

    Filesize

    5KB

    MD5

    2c6eae9be4207d9b385b11b1bfd7d055

    SHA1

    41e389a4408578284bd5aba43da770a296067be0

    SHA256

    c07bc8e6d2c80e18c98fca41752969f2faa7857baf510bfae6b48a80356c8ae3

    SHA512

    e73911d5772128e2ea9c8b14190ab4f947bb77417b4acc707e79d9898a51c7e8c884e64d4e229cb7adec2409f4774ac63a6f30ba19027d3f02274b190131323a

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    40KB

    MD5

    220bd91e8ef870a94e96555f4b560659

    SHA1

    99a616cf572308a6de9049844037755b6adf4acf

    SHA256

    0a7e31b475ef8bd26610c9fab2719fe1d6ab3d06fcb0fea786c6c37b4c7312ee

    SHA512

    6a255abead13e167b0e26a5a9acf6e731e216f074300a20fa59e7254d593eb0ffe04fef0bc2e321d421573c7e06c3e44eabe493499f7660104fff86cf0d180d4

  • C:\Windows\MSWDM.EXE

    Filesize

    40KB

    MD5

    220bd91e8ef870a94e96555f4b560659

    SHA1

    99a616cf572308a6de9049844037755b6adf4acf

    SHA256

    0a7e31b475ef8bd26610c9fab2719fe1d6ab3d06fcb0fea786c6c37b4c7312ee

    SHA512

    6a255abead13e167b0e26a5a9acf6e731e216f074300a20fa59e7254d593eb0ffe04fef0bc2e321d421573c7e06c3e44eabe493499f7660104fff86cf0d180d4

  • C:\Windows\MSWDM.EXE

    Filesize

    40KB

    MD5

    220bd91e8ef870a94e96555f4b560659

    SHA1

    99a616cf572308a6de9049844037755b6adf4acf

    SHA256

    0a7e31b475ef8bd26610c9fab2719fe1d6ab3d06fcb0fea786c6c37b4c7312ee

    SHA512

    6a255abead13e167b0e26a5a9acf6e731e216f074300a20fa59e7254d593eb0ffe04fef0bc2e321d421573c7e06c3e44eabe493499f7660104fff86cf0d180d4

  • C:\Windows\devED24.tmp

    Filesize

    5KB

    MD5

    2c6eae9be4207d9b385b11b1bfd7d055

    SHA1

    41e389a4408578284bd5aba43da770a296067be0

    SHA256

    c07bc8e6d2c80e18c98fca41752969f2faa7857baf510bfae6b48a80356c8ae3

    SHA512

    e73911d5772128e2ea9c8b14190ab4f947bb77417b4acc707e79d9898a51c7e8c884e64d4e229cb7adec2409f4774ac63a6f30ba19027d3f02274b190131323a

  • memory/1640-140-0x0000000000000000-mapping.dmp

  • memory/1640-143-0x00007FFE17010000-0x00007FFE17A46000-memory.dmp

    Filesize

    10.2MB

  • memory/1820-133-0x0000000000000000-mapping.dmp

  • memory/1820-145-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2204-136-0x0000000000000000-mapping.dmp

  • memory/2204-144-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5028-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5028-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB