Analysis

  • max time kernel
    181s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2022, 10:06

General

  • Target

    526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe

  • Size

    848KB

  • MD5

    6f9bde6960f97b503b7c76cb727770cd

  • SHA1

    767bc290bf4fb369fcc7553d78f8c23dbe512205

  • SHA256

    526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403

  • SHA512

    0ec861db946c4533b7f3c2ffec6c073f8bc0d3408474406465ac726e3d32393b3a7f110e0686a71fc3335885b78c643645bdbb58a89ebd460ef846776f39a257

  • SSDEEP

    24576:440++sj6vOQ5uVq1gpLiV+vclI+St8l36RD3:440g6l5upLiYclAt8l3E

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe
        "C:\Users\Admin\AppData\Local\Temp\526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

      Filesize

      28KB

      MD5

      6f8c474fd7ce012eb4adf3fbfd28d08e

      SHA1

      ad3c02291f2b5995c3c3657e4dc330ae692ecbeb

      SHA256

      0d1f7323734fad97096545a7ea3622ac5dc7a891932566c3b5f50571c15d1ca7

      SHA512

      780881e8033f7a7fe04c879e3073319211cf233d6c76b026c913cba09b1434a42555b55f66901e9e30698fd876f1ada95b93412d0a2bba3749895265d2c2790e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

      Filesize

      28KB

      MD5

      6f8c474fd7ce012eb4adf3fbfd28d08e

      SHA1

      ad3c02291f2b5995c3c3657e4dc330ae692ecbeb

      SHA256

      0d1f7323734fad97096545a7ea3622ac5dc7a891932566c3b5f50571c15d1ca7

      SHA512

      780881e8033f7a7fe04c879e3073319211cf233d6c76b026c913cba09b1434a42555b55f66901e9e30698fd876f1ada95b93412d0a2bba3749895265d2c2790e

    • memory/884-137-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/884-138-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/1040-136-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB

    • memory/3736-132-0x0000000001000000-0x00000000010E0000-memory.dmp

      Filesize

      896KB

    • memory/3736-139-0x0000000001000000-0x00000000010E0000-memory.dmp

      Filesize

      896KB