Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 14:33

General

  • Target

    147cdd423f9f36aea9c8d9f97884598b6ab49ae3de43edddc50b2123535e5f39.exe

  • Size

    4.1MB

  • MD5

    19a9a5aa7b01ef16957e5a27ee67de2d

  • SHA1

    9bc0a38a9bc2ad972b0cecdbd41beca922ca52a6

  • SHA256

    147cdd423f9f36aea9c8d9f97884598b6ab49ae3de43edddc50b2123535e5f39

  • SHA512

    bf17be6fd5c1b48025ece53234634165ee4e30d6af2236ef35a1d9d2c899ac4369950fcc847e7ab25527fcd5f196e32a3019535bf7de7d8412b64976059d3d60

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\147cdd423f9f36aea9c8d9f97884598b6ab49ae3de43edddc50b2123535e5f39.exe
    "C:\Users\Admin\AppData\Local\Temp\147cdd423f9f36aea9c8d9f97884598b6ab49ae3de43edddc50b2123535e5f39.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2948

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      620a2cfea05e93fd3cf8c336f44db512

      SHA1

      72248366cd3d3a61d4f8b298ffa13479a40ec240

      SHA256

      33f64ca458bfd223ac1e542db3d3288eeefd271dc0126d1d5f5d8b0abcd07cbc

      SHA512

      322f27714c9e6503e06a2167f1db02e1b15b8655d85644242aec578268c2d241adf27b96ffd44b3f6535ba7e1dec473e038dc4d911d5e341b60dede6da76dcff

    • memory/384-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/384-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/384-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB