Analysis

  • max time kernel
    164s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 09:25

General

  • Target

    812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe

  • Size

    154KB

  • MD5

    4f9c292680910b6771a89cb1cb77e680

  • SHA1

    97df76ecc8593f7c62b92cb781f9236a45eb7d00

  • SHA256

    812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f

  • SHA512

    05475ab90aca31917963d748510ee09e499ac1f28af69265c10c298d5e36e7459bbe1717fffcde0678e5c35d36886e586a9e46b3208d0f78897efe2607259adf

  • SSDEEP

    3072:mtWZqwoa9Xa1Idart19Z1pPxctR1jfvk/Y271ahwVlxXYEtzcS:mtxIqqde1pPxctR1jfvk/Y271ahwVlx/

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Blocklisted process makes network request 33 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe
    "C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe
      "C:\Users\Admin\AppData\Local\Temp\812bde6c32aeb16362516dff9a3f93163fc2469cfe362f03e0c0d166c1a54a9f.exe"
      2⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\syswow64\msiexec.exe
        3⤵
        • Adds policy Run key to start application
        • Blocklisted process makes network request
        • Drops file in Program Files directory
        PID:736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/736-137-0x00000000003A0000-0x00000000003B2000-memory.dmp

    Filesize

    72KB

  • memory/736-138-0x0000000000DE0000-0x0000000000DE5000-memory.dmp

    Filesize

    20KB

  • memory/736-139-0x0000000000DE0000-0x0000000000DE5000-memory.dmp

    Filesize

    20KB

  • memory/5100-133-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/5100-135-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB