Analysis

  • max time kernel
    136s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 14:30

General

  • Target

    c57d1ac838565c272795e44338daa096d23267d7a1658116cad8d88f64dc8515.exe

  • Size

    231KB

  • MD5

    633d6cadf426ae145f9e4f9e2f01b87b

  • SHA1

    975512f82055635b28ccce5b87b7fbf750786eb5

  • SHA256

    c57d1ac838565c272795e44338daa096d23267d7a1658116cad8d88f64dc8515

  • SHA512

    3d9fe2aec6a3116f7783ead51b17d7c29534e315e6b1c18e0b5f50f7fadda3ffc0b9054de86c1344fa57546e15e37f3a537755d0f5f804c7edb03cadb78dc9b0

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c57d1ac838565c272795e44338daa096d23267d7a1658116cad8d88f64dc8515.exe
    "C:\Users\Admin\AppData\Local\Temp\c57d1ac838565c272795e44338daa096d23267d7a1658116cad8d88f64dc8515.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4860

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            de5f3ece3bd2ddcd5fbfe112986e5771

            SHA1

            230152d85907fe6cfcc70626f1688288a4018566

            SHA256

            b13201fb665437dbddc56fd59d31f295258eecb8534344269483a65008524530

            SHA512

            58a50fd4d384e09ca0066c6c7aa0d9ff77fad52e6dc8346cb71a8059f18ac165a4cf3c857b385ba8351c784a4903ca76378ecdd51efae3656351aa1bfe5935fb

          • memory/3600-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3600-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3600-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB