Analysis

  • max time kernel
    180s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2022 17:03

General

  • Target

    c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155.exe

  • Size

    156KB

  • MD5

    a09bdd634c41cd21c6ea2a9903e48280

  • SHA1

    c549574b6d345eae259b1f0b08c1c394703cbf18

  • SHA256

    c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155

  • SHA512

    4e1ab723db1045907aec53caabcf72342015115b2efc4a46f16140924b66ed42ea3377870e4810eae3c18e4a4628229490c6782e4f63488e8fb8f833d01aa608

  • SSDEEP

    3072:86jI9XJy7rRAolpnyhcqPL1/7w6ZAs+VBKL:fUZyWolpnyhFQVk

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155.exe
    "C:\Users\Admin\AppData\Local\Temp\c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:4364
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev9385.tmp!C:\Users\Admin\AppData\Local\Temp\c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\C8DD5A5B3E5976858D09F687E8D851FAD4E6EA914D4F467276F5719B2D5B3155.EXE
        3⤵
        • Executes dropped EXE
        PID:5052
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev9385.tmp!C:\Users\Admin\AppData\Local\Temp\C8DD5A5B3E5976858D09F687E8D851FAD4E6EA914D4F467276F5719B2D5B3155.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C8DD5A5B3E5976858D09F687E8D851FAD4E6EA914D4F467276F5719B2D5B3155.EXE

    Filesize

    156KB

    MD5

    75b156a33308f2af5e6c00cf609219fb

    SHA1

    b879314b6888db579f12a490f47b141b88525be1

    SHA256

    0702a18bf3e8672d51221ffbc1c75cba6bbcdf9f17af41bdc27d66d6d3fcff26

    SHA512

    248134b341877217794ab4d43d85ea2eca558e71d77bde67d31122b288e9dc48139e1cb339fa60f811600ce8757128b0b192ea943220b622f90c385558f1a48d

  • C:\Users\Admin\AppData\Local\Temp\C8DD5A5B3E5976858D09F687E8D851FAD4E6EA914D4F467276F5719B2D5B3155.EXE

    Filesize

    156KB

    MD5

    75b156a33308f2af5e6c00cf609219fb

    SHA1

    b879314b6888db579f12a490f47b141b88525be1

    SHA256

    0702a18bf3e8672d51221ffbc1c75cba6bbcdf9f17af41bdc27d66d6d3fcff26

    SHA512

    248134b341877217794ab4d43d85ea2eca558e71d77bde67d31122b288e9dc48139e1cb339fa60f811600ce8757128b0b192ea943220b622f90c385558f1a48d

  • C:\Users\Admin\AppData\Local\Temp\c8dd5a5b3e5976858d09f687e8d851fad4e6ea914d4f467276f5719b2d5b3155.exe

    Filesize

    76KB

    MD5

    f8a069e7d2bb8868cea4def627cde6e9

    SHA1

    25f64b33dd8d98766e12272aab10f6c44cd00d0f

    SHA256

    5af3085b3970bb90679b1afd187b10b98ae4551d7962448b79b2f2def151f3eb

    SHA512

    67ebcd7bd7f2fa224f82762e80f21d27b41a217f07572b278261a2163d55b5e22f1f47522670e3ef570dd4e70a8fc70a84eb3a8e4a3087f34fa6e2cec6ef2985

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    80KB

    MD5

    51ffd84d0056bbe31486979a150c91df

    SHA1

    d7773afd81dc28b58223a3400dde3c92db9c4916

    SHA256

    9d39d2016f5e76bb681f4ff7b5be03e5b1f4ca63863c656e70e393b5ee687939

    SHA512

    2286390e7567bf672e8d0a86086dbcd3ed7d6bc3e760fdef73f3a1b40eb4ea676dc7dfad64b38c9573bcfb17c958c157164be787d1574aa7b814f7641412fc76

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    51ffd84d0056bbe31486979a150c91df

    SHA1

    d7773afd81dc28b58223a3400dde3c92db9c4916

    SHA256

    9d39d2016f5e76bb681f4ff7b5be03e5b1f4ca63863c656e70e393b5ee687939

    SHA512

    2286390e7567bf672e8d0a86086dbcd3ed7d6bc3e760fdef73f3a1b40eb4ea676dc7dfad64b38c9573bcfb17c958c157164be787d1574aa7b814f7641412fc76

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    51ffd84d0056bbe31486979a150c91df

    SHA1

    d7773afd81dc28b58223a3400dde3c92db9c4916

    SHA256

    9d39d2016f5e76bb681f4ff7b5be03e5b1f4ca63863c656e70e393b5ee687939

    SHA512

    2286390e7567bf672e8d0a86086dbcd3ed7d6bc3e760fdef73f3a1b40eb4ea676dc7dfad64b38c9573bcfb17c958c157164be787d1574aa7b814f7641412fc76

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    51ffd84d0056bbe31486979a150c91df

    SHA1

    d7773afd81dc28b58223a3400dde3c92db9c4916

    SHA256

    9d39d2016f5e76bb681f4ff7b5be03e5b1f4ca63863c656e70e393b5ee687939

    SHA512

    2286390e7567bf672e8d0a86086dbcd3ed7d6bc3e760fdef73f3a1b40eb4ea676dc7dfad64b38c9573bcfb17c958c157164be787d1574aa7b814f7641412fc76

  • C:\Windows\dev9385.tmp

    Filesize

    76KB

    MD5

    f8a069e7d2bb8868cea4def627cde6e9

    SHA1

    25f64b33dd8d98766e12272aab10f6c44cd00d0f

    SHA256

    5af3085b3970bb90679b1afd187b10b98ae4551d7962448b79b2f2def151f3eb

    SHA512

    67ebcd7bd7f2fa224f82762e80f21d27b41a217f07572b278261a2163d55b5e22f1f47522670e3ef570dd4e70a8fc70a84eb3a8e4a3087f34fa6e2cec6ef2985

  • memory/1428-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1428-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4364-149-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4992-146-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5116-142-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5116-148-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB