Analysis

  • max time kernel
    143s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-10-2022 19:01

General

  • Target

    d2b693bbfb2d0678d03916faaf590d6ac61dcfb8f3f33a205c4d315bca232a6d.exe

  • Size

    32KB

  • MD5

    50de36f0bce53e1e3b739425982adc40

  • SHA1

    3c31f46ed74e89ace10e63777a2198e6d572f497

  • SHA256

    d2b693bbfb2d0678d03916faaf590d6ac61dcfb8f3f33a205c4d315bca232a6d

  • SHA512

    f29df79458d544b8305967c9d51139ee84d16bfd4cb2df6c2132b61f6c9d91703dccac2dfe6942353d75322207a8e56d40ea8aea7c8ab990e748577d2f6f021a

  • SSDEEP

    384:f98xUHQHjb4Uay4/q8zLei6erkteKOSzwMuGUPfxN+GIwFnvmbmCBNf4Cwg:WwkoUaBqoprKOS0dPf/1IwFvMm2N3wg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2b693bbfb2d0678d03916faaf590d6ac61dcfb8f3f33a205c4d315bca232a6d.exe
    "C:\Users\Admin\AppData\Local\Temp\d2b693bbfb2d0678d03916faaf590d6ac61dcfb8f3f33a205c4d315bca232a6d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:4792
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Suspicious use of UnmapMainImage
      PID:4632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 12
        3⤵
        • Program crash
        PID:5112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4632 -ip 4632
    1⤵
      PID:480

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~dfds3.reg

      Filesize

      166B

      MD5

      f44153ef26be29552cf320325ad8b72e

      SHA1

      74ac72ba2ff0f871e59b11c95ad707372662370c

      SHA256

      767009fb8726500a4bc54b2ee744cc3ada64fdf16a44e22ff9dfe7652e2a439f

      SHA512

      1d42a4dba1d8d0df9f8fedfba384ffdbcff3103c8ba360f255b5d7e8a46128f40521e4d16cf6de04365b3b6ffad8bc681cf7042d92867ab3d912601a3d5e6e65

    • memory/2640-132-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2640-137-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4632-135-0x0000000000000000-mapping.dmp

    • memory/4632-136-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/4792-133-0x0000000000000000-mapping.dmp