Analysis

  • max time kernel
    130s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 06:11

General

  • Target

    7fba23cf6951055987b4da86540be1ca73193f90561a48abda196add41983aae.exe

  • Size

    68KB

  • MD5

    8075e73e835d32d66790daf96318b855

  • SHA1

    51b9db3e86f1b99647b98dcd72072408228d1e6f

  • SHA256

    7fba23cf6951055987b4da86540be1ca73193f90561a48abda196add41983aae

  • SHA512

    dbf7ee2501ed4c7e8aa1e316b4ed7116fe9f321d368948a66a1dfd6ecaebecd1ddc3353956a3ae376b027bdc731390bae36cefb4e24b39cbd34def93895d624a

  • SSDEEP

    768:K8EyXFiQOgFpSafqnlZQBISf968C36JpW:K8fIWfKiISf96qpW

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fba23cf6951055987b4da86540be1ca73193f90561a48abda196add41983aae.exe
    "C:\Users\Admin\AppData\Local\Temp\7fba23cf6951055987b4da86540be1ca73193f90561a48abda196add41983aae.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\del.bat
      2⤵
        PID:1224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\del.bat

      Filesize

      284B

      MD5

      fd648e38610e874a9a7fd9b76633bbd8

      SHA1

      56ebc1beb24c7a34121008eb4c954f5bde50e653

      SHA256

      c756b6f7e2e51f584e39aa550dde04f44ecc7e8026b87484a7b26e405e28f39a

      SHA512

      d2c5772f81b1d1bad77d5941f822499737c8df747c42b1080c85ba52ff17ce0a46cc80fda723a4874a8830d0d44c9d9dcef680fe278775ea9719e8590514a1fe