Analysis

  • max time kernel
    106s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 13:45

General

  • Target

    436034a41f567fcb1d0184562d683e724a3253bd054e25d9161b959ff836f6d9.exe

  • Size

    646KB

  • MD5

    a20cb4571fdf32c654763508eb3e5860

  • SHA1

    2725dcbda472d394040bb1f529c1f465b3b77520

  • SHA256

    436034a41f567fcb1d0184562d683e724a3253bd054e25d9161b959ff836f6d9

  • SHA512

    08687499d93b1ebba06bc306bf206ede927540c60494659dc102eec6666a887ac6f43f8ad9e2a7ba668f23183afed645ade26bd6b88a0f40d5dcadf912a3dbde

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqvYGVpRlBSvPo2Ght:352T3siXei5bcmP9JfUjWhpE

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\436034a41f567fcb1d0184562d683e724a3253bd054e25d9161b959ff836f6d9.exe
    "C:\Users\Admin\AppData\Local\Temp\436034a41f567fcb1d0184562d683e724a3253bd054e25d9161b959ff836f6d9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:1200

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      4838b5ead790a2b04e585e2334dff7c1

      SHA1

      f72cae5f3eae4395cb454e6720f0357f26a1f339

      SHA256

      d04a8ec95daf3b7a8d23110e1b3b999f7e6c519518776aad941c81c1bd422dbb

      SHA512

      26b5f4badf94ccd5147b6e83136134cebafbf6a8619af2dd5f7e765ad40adbe17485fe38e93f91db3f734510ee2a9e0821c06d583b2ad51594b8c59ff862adbc

    • memory/1512-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1512-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/1512-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB