Analysis

  • max time kernel
    108s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2022 17:25

General

  • Target

    06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe

  • Size

    527KB

  • MD5

    0ab1282908b88245cd942610cdc4e406

  • SHA1

    ea63c5d71b773acfd973662d6527e47c409c5c2e

  • SHA256

    06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12

  • SHA512

    b67badedd61ad09b7820e8443a621b10ce736c07e899fe3809902a8e41b6291530c0384a3b6534baca0582a9e0d15b3a99b76567ca286a119f251cf2c1c01462

  • SSDEEP

    6144:2yH7xOc6H5c6HcT66vlmkO/PJcxWi+V5BkaDxb+U9mmdWK0oZURRJkU0f3ekGa:2a8/PJyWi+V5BRxXndWK0oZURRJJbK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in Program Files directory 26 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe
    "C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe
        "C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe"
        3⤵
        • Executes dropped EXE
        PID:4852
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:3336

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\06854b1791a34db58a90d540987db3e2cfafdffb9ef0d1c10fbee7ba4244bc12.exe

    Filesize

    491KB

    MD5

    0c51c90feae33974458b33d93d7ccc18

    SHA1

    1ec8108b871bfe3b64032321087cd21d62d33c64

    SHA256

    d6fa0be51a74459e4d4d57cb516e2276e85cee6818cca723c39a21e43ed399c6

    SHA512

    5d8bd77c437a662cce75fcf9d18002bf0ef5d0771086c3d23d6e1c2321c4b675867397093b956f11d75fa2da43897a30e8daefe200081a72859b54d814ca4a47

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b