Analysis

  • max time kernel
    175s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 12:49

General

  • Target

    b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe

  • Size

    226KB

  • MD5

    4a4b2303320a0ba42476b20ed3badee0

  • SHA1

    c7754ad51ca9acd1eb630747002803766659d483

  • SHA256

    b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591

  • SHA512

    d469d56a12a7baa4a411984fab994dc4e00d58fc27b0f3418d4cdb59dada7497ef9e44ddd94ee4065994103778b72f0c9cddb3b112f44132774391f87b184b09

  • SSDEEP

    6144:6yH7xOc6H5c6HcT66vlmq9WIZOAIpl+4vcHz9ek6Rz6oSarz6Bmzpf7g8:6aXZNID3Ueko6oSHUV7g8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
    "C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3324
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"
      2⤵
      • Executes dropped EXE
      PID:1580
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    eca2fcc8d70a27b1b939835734563866

    SHA1

    9ad9bc1416ca7c0a761ca734ebc105541d2fe8ab

    SHA256

    134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17

    SHA512

    0acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    eca2fcc8d70a27b1b939835734563866

    SHA1

    9ad9bc1416ca7c0a761ca734ebc105541d2fe8ab

    SHA256

    134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17

    SHA512

    0acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    eca2fcc8d70a27b1b939835734563866

    SHA1

    9ad9bc1416ca7c0a761ca734ebc105541d2fe8ab

    SHA256

    134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17

    SHA512

    0acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c

  • memory/1580-132-0x0000000000000000-mapping.dmp