Analysis

  • max time kernel
    143s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 12:18

General

  • Target

    c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe

  • Size

    288KB

  • MD5

    a00b00897292a31af750ec0d7702a760

  • SHA1

    895983c059fb503f6cbe52cda87ae6fe2f778665

  • SHA256

    c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb

  • SHA512

    910808b34854005806f80c274c08c483f8750efad6c5598d4f3f113a70df256e94fb720e08bd3b6df9165cddc1810778696b353e700a3fce98a765c01d73fda8

  • SSDEEP

    3072:GqPL1/7w6ZAs+VBKiAmLy0wUNGbU7Y2xBRYEmq9TMLRuRSWjbdCz2hqG3Tp9TM9G:zQVjBeC9TMtuRRx0sL9TM9u

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe
    "C:\Users\Admin\AppData\Local\Temp\c1981ac613ecc24c82e57a3f7e5b38876bb7ca58fbd722bda45b07ab0b6a1ccb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\77582098.exe
      C:\77582098.exe
      2⤵
      • Executes dropped EXE
      • Sets DLL path for service in the registry
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:4780
  • C:\Windows\SysWOW64\Svchost.exe
    C:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:1012
  • C:\Windows\SysWOW64\Svchost.exe
    C:\Windows\SysWOW64\Svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    PID:3696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\77582098.exe

    Filesize

    210KB

    MD5

    2019b2838d672cebe97725033dc7398a

    SHA1

    6d4e99c06cf8ef1dfab95d62b6888216c16d721b

    SHA256

    12f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced

    SHA512

    10ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918

  • C:\77582098.exe

    Filesize

    210KB

    MD5

    2019b2838d672cebe97725033dc7398a

    SHA1

    6d4e99c06cf8ef1dfab95d62b6888216c16d721b

    SHA256

    12f076ea183dd8febd8d61cdca4ad77895aadf2c3a871e6dc67e2d70820f7ced

    SHA512

    10ed888f111f48a7951448960ed5aaf8e33add4e096b44e771e60daa0ff7453992d951fee923ef0560b9143dc2b6528ec9fe159913170e63e819a74babc9c918

  • C:\Users\Infotmp.txt

    Filesize

    720B

    MD5

    01dabc7950e97f79da6838986fc8bb2c

    SHA1

    cac809d566b6b92e61a22e9875983961d1f55831

    SHA256

    ee481586dd0d75458091d47436b50cbdf0bcbd3573929b2a4205601c348de425

    SHA512

    b7c995b18ed5e2703c6bc492d6950a0bd2e9e440b900fbfea69df3c1089c3f1dff75cdc63dbef75be52348dcee218a14b950fe4f22bd8490593c5465c43b04de

  • C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll

    Filesize

    210KB

    MD5

    94e093112668837f74b208324fa2ac4f

    SHA1

    a32ef9576d574578335d939cfa14f3eeaa1109a8

    SHA256

    cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09

    SHA512

    8f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d

  • C:\Windows\SysWOW64\Irmon.dll

    Filesize

    210KB

    MD5

    94e093112668837f74b208324fa2ac4f

    SHA1

    a32ef9576d574578335d939cfa14f3eeaa1109a8

    SHA256

    cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09

    SHA512

    8f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    210KB

    MD5

    94e093112668837f74b208324fa2ac4f

    SHA1

    a32ef9576d574578335d939cfa14f3eeaa1109a8

    SHA256

    cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09

    SHA512

    8f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d

  • \??\c:\windows\SysWOW64\irmon.dll

    Filesize

    210KB

    MD5

    94e093112668837f74b208324fa2ac4f

    SHA1

    a32ef9576d574578335d939cfa14f3eeaa1109a8

    SHA256

    cd65d11401930f799e3121e29c03ec5190c11d4532ff8854495aca14223b4a09

    SHA512

    8f92599afde729c92db71d83d48e93fcf417af916217829354ce050ca2c8bfade97e42b0a15eaa3705168bdeb7bd9274f2617c0cd9369e51dd0291a11bf06b7d

  • memory/1012-144-0x0000000074A60000-0x0000000074A99000-memory.dmp

    Filesize

    228KB

  • memory/1012-141-0x0000000074A60000-0x0000000074A99000-memory.dmp

    Filesize

    228KB

  • memory/1144-135-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1144-148-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/3696-147-0x00000000749F0000-0x0000000074A29000-memory.dmp

    Filesize

    228KB

  • memory/4780-138-0x0000000002280000-0x0000000006280000-memory.dmp

    Filesize

    64.0MB

  • memory/4780-145-0x0000000000550000-0x0000000000589000-memory.dmp

    Filesize

    228KB

  • memory/4780-137-0x0000000002280000-0x0000000006280000-memory.dmp

    Filesize

    64.0MB

  • memory/4780-136-0x0000000000550000-0x0000000000589000-memory.dmp

    Filesize

    228KB