Analysis

  • max time kernel
    180s
  • max time network
    221s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 13:42

General

  • Target

    9081083ae0fadd9b5c0985c5068df0b1718142731a1e54cbc1dcd0718705ba98.exe

  • Size

    681KB

  • MD5

    a1beaded3826f1cf0f8c1d8232616520

  • SHA1

    858c59944e8e6a3aac3cc0aa847b58a031fd27be

  • SHA256

    9081083ae0fadd9b5c0985c5068df0b1718142731a1e54cbc1dcd0718705ba98

  • SHA512

    e372adf4c75e63a16c4e13619b788a6a28a2a1234120d9456263160809580153eca2037bf40d8db393f78873be26041cb65bbe186c78ccb1f56ab6a581f518cc

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9081083ae0fadd9b5c0985c5068df0b1718142731a1e54cbc1dcd0718705ba98.exe
    "C:\Users\Admin\AppData\Local\Temp\9081083ae0fadd9b5c0985c5068df0b1718142731a1e54cbc1dcd0718705ba98.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      ae14d6305c8c62322c783b007b828949

      SHA1

      4f5558ad4555c19256d3f8b8c2b1f3ca3030d13a

      SHA256

      bdd344e72e03e00a7a8608095582bfbacab0f3d02ab1af13146616caa11cc8db

      SHA512

      bfd4c874d32766a20095cd9536614f7ea4f2853a9de4c5d17f92dee5614cc545059dacdc5dab292770975680abbc61664e1b910eebcd12e3165b08684db9f958

    • memory/636-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/636-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/636-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB