Analysis

  • max time kernel
    190s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 15:00

General

  • Target

    f8a5389f69ae07300d0ac661cc229d8b803b6732b98d6c567b2336bf1fe8f0b9.exe

  • Size

    388KB

  • MD5

    96305ee1d0384ad8bdb3be8edbab60b2

  • SHA1

    06c86e995b33113bcf3274f9ba5951db441de5b8

  • SHA256

    f8a5389f69ae07300d0ac661cc229d8b803b6732b98d6c567b2336bf1fe8f0b9

  • SHA512

    1a4d50a89764e88dbcc150ae3238e316fd6429b92b6ce3451f60f55ff8ca5dfbf5c7bb457d3c4e02a2d431b988ddc828b97aac5acf769687a5897a0dfd602630

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8a5389f69ae07300d0ac661cc229d8b803b6732b98d6c567b2336bf1fe8f0b9.exe
    "C:\Users\Admin\AppData\Local\Temp\f8a5389f69ae07300d0ac661cc229d8b803b6732b98d6c567b2336bf1fe8f0b9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      1f840377f06526da9635a273d5748dfb

      SHA1

      a33454c181cb8e15f7385c52e825f81c92531d2a

      SHA256

      cda6b493cec5acc25c2f2b5cbe4d4ef8b85641015aeae96142a3cfebc8dbec0a

      SHA512

      78823d9f6f983bdf39c0d6e10a6d2c61788442096b82eb1a9f05445f40cd6e6eeea3889c3febbb62c9e2ded05956b5698901db8940179a631fe9fecf8b930216

    • memory/2764-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2764-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2764-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3728-134-0x0000000000000000-mapping.dmp