Analysis

  • max time kernel
    95s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 15:01

General

  • Target

    c503b7af22262bbef1762deaef7b1a8590883b77efc139b133ce8746d8a75fe3.exe

  • Size

    957KB

  • MD5

    818719cc2ec98a8d8e6c1ba6bca973d9

  • SHA1

    cb9d68e38fe526fa86e2ca461b6b9df4776213af

  • SHA256

    c503b7af22262bbef1762deaef7b1a8590883b77efc139b133ce8746d8a75fe3

  • SHA512

    170910c363773e16160712d0237f53bbeffe582260083600f8e1a61c5a6d5b8c8896ad0e24c9a175a31c4a5ac621c57854d83bddec480a889345e1573cf42f68

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c503b7af22262bbef1762deaef7b1a8590883b77efc139b133ce8746d8a75fe3.exe
    "C:\Users\Admin\AppData\Local\Temp\c503b7af22262bbef1762deaef7b1a8590883b77efc139b133ce8746d8a75fe3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:1012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      da031cc29c2184c8b5c7931d7fb750c9

      SHA1

      d1ddabd80e105c7e27362d8ff0853f3a643ff9f1

      SHA256

      5a1574ab04c1d61b893a14812a8892e330022fbde82be297a3b963b6ba1242c5

      SHA512

      75a2123584486babc9783a0bb3347b9efba354064ed7d6d3dfa872144943d9e087b7c69849a501c628000dd1afb09b5488c06954677d0659375e11d2756bc99e

    • memory/1012-134-0x0000000000000000-mapping.dmp

    • memory/5044-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/5044-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/5044-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB