Analysis

  • max time kernel
    157s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 00:51

General

  • Target

    73542c0b8bb4b290bcc7349bcf68996ea4fc9c3c91fdf33e3a572fb75e9b31ca.exe

  • Size

    402KB

  • MD5

    a124fcda543cf75bab3ea2f82fbf75a1

  • SHA1

    4e8602d5944478ce868f64020d3e4b5c404ecb2d

  • SHA256

    73542c0b8bb4b290bcc7349bcf68996ea4fc9c3c91fdf33e3a572fb75e9b31ca

  • SHA512

    c20fb3fd7eecef5f70e47fa58f0e2f12dbe19ada71f7e53020c96ad70e0ccd8761ba68eaac92f31e49971a758cd01957c30f8c4e982be288098a218691644cad

  • SSDEEP

    6144:MRAhhJxX7bNIAROzTuaPUD8XRufY7L3oxXTwMJUbwHANxUfRIFRZRlxqFPMPazij:UsAAPaPUD1SYzJuwHAgJIFRtxZZj

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73542c0b8bb4b290bcc7349bcf68996ea4fc9c3c91fdf33e3a572fb75e9b31ca.exe
    "C:\Users\Admin\AppData\Local\Temp\73542c0b8bb4b290bcc7349bcf68996ea4fc9c3c91fdf33e3a572fb75e9b31ca.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies Installed Components in the registry
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:4140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 712
      2⤵
      • Program crash
      PID:1780
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4140 -ip 4140
    1⤵
      PID:820

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4140-132-0x0000000000400000-0x0000000000435000-memory.dmp

            Filesize

            212KB