Analysis

  • max time kernel
    151s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 13:44

General

  • Target

    53ea0f1e5e6ce7c2f4f9ea5734d6abe70e7e79dd6d9ba7c9f68de1a223b2f295.exe

  • Size

    337KB

  • MD5

    a16ab8211c77b7090800f361ed6afa30

  • SHA1

    7e75f3a51fdc48a6089288f076d8cb08a153f985

  • SHA256

    53ea0f1e5e6ce7c2f4f9ea5734d6abe70e7e79dd6d9ba7c9f68de1a223b2f295

  • SHA512

    70f8d269eedce224865746bacd2cae6e3c6ea232484ecea08963a2d637d1a04cc0ac41cdfa067cbd416205333c8e6e1cc29d58d0284ff7404a742d403f0d300e

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53ea0f1e5e6ce7c2f4f9ea5734d6abe70e7e79dd6d9ba7c9f68de1a223b2f295.exe
    "C:\Users\Admin\AppData\Local\Temp\53ea0f1e5e6ce7c2f4f9ea5734d6abe70e7e79dd6d9ba7c9f68de1a223b2f295.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2824

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            f1119a7cb4984a42a87ec53b8afa6e1d

            SHA1

            3b18ca0be120b483b807cf7031d4dd79b33f4b28

            SHA256

            7eeeee04139ba57adc436368bcd0a379b6012c1cf7fae31eae1b9ae8acd0eb3a

            SHA512

            9fc03df397bc2ce7c993fa9f330c4a820780243f82c67ba164443907e7623ad26a90955e6358d0f127d0c3b2dcd88c33146b64b4d116d5f53d796303a55214a6

          • memory/1420-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1420-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1420-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB