Analysis

  • max time kernel
    98s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 15:03

General

  • Target

    7cf48b4db6daac59d164bbf53f709c1c9397f391fd9d5243e96604994e594e9e.exe

  • Size

    750KB

  • MD5

    80ee7708c74212b95ab7052c712252ce

  • SHA1

    b346d6266f6c33c872e9a6cd3a41f2f6459c50b6

  • SHA256

    7cf48b4db6daac59d164bbf53f709c1c9397f391fd9d5243e96604994e594e9e

  • SHA512

    694a5efe7eb79924ce96a119653d9b5547a2023e1a3c62332c72290d8d3c9bf5f4f8bbf1b5e4d8c9ed4a261a7a86e7fffe9a3fb8cbc0fc11c4215df1a2f11384

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cf48b4db6daac59d164bbf53f709c1c9397f391fd9d5243e96604994e594e9e.exe
    "C:\Users\Admin\AppData\Local\Temp\7cf48b4db6daac59d164bbf53f709c1c9397f391fd9d5243e96604994e594e9e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2388

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      4adf814469b2d704ec4160629c996cd4

      SHA1

      8182414e530c8464082ea2ea50b4d66327b4c8b8

      SHA256

      38a22dcb5988bf414f9270252693a75c2bc95133259e703c8a2c7a24febef36b

      SHA512

      8c5817279dee89b61265b50620940774544c975fc9fa813f6e803c28e7c9cf2de0cbbcff5e68e8e509ab4610d76af643d4ba0db5f68683dbd1688624ff8206ae

    • memory/4156-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4156-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4156-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB