Analysis

  • max time kernel
    111s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/10/2022, 20:00

General

  • Target

    6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe

  • Size

    116KB

  • MD5

    0cc84c9198c0f8114b93b6ad9fc7fea0

  • SHA1

    856783c900821b9ada521077a903146cf26b7547

  • SHA256

    6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e

  • SHA512

    5948499c50dfff291fbcf8cb4ce4215843dba48d06fa58b2abdac1f0180d2d55e212f73026a47d58817eca14f4a79bd71c1e3f423edf878e3f75026219a6b264

  • SSDEEP

    1536:IMASiLNFZdO//OE1C90AdDNo75J84L67uKPYgat85tEKcyc2VDcm06tqfVXhwwAF:I3vO//l1uH67T8P7Qga3KcyjbHCg92

Malware Config

Signatures

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe
    "C:\Users\Admin\AppData\Local\Temp\6f5fdbf2136b8238f2f81fe8288bcd76afc4b0fb22a2194471b6434020371a2e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\1c1c28c1.exe
      C:\1c1c28c1.exe
      2⤵
      • Executes dropped EXE
      • Sets DLL path for service in the registry
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3468
  • C:\Windows\SysWOW64\Svchost.exe
    C:\Windows\SysWOW64\Svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    PID:2516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1c1c28c1.exe

    Filesize

    83KB

    MD5

    aec8154a2a499457a2ba4e1fab3c6f20

    SHA1

    3dee15136d62a29ef1f5b5e99cf89efa94c6e15f

    SHA256

    5233165c72533b728f7189f9f51f9b7ac2678586b93428bb917a38ff8eb97f06

    SHA512

    721078a4315993132701ee67e6387dd571508f1c54850c715008755e71b1942c3a41b4ff2e82de392fbc5713b973b90794a88897a17016205c08220f9ded515e

  • C:\1c1c28c1.exe

    Filesize

    83KB

    MD5

    aec8154a2a499457a2ba4e1fab3c6f20

    SHA1

    3dee15136d62a29ef1f5b5e99cf89efa94c6e15f

    SHA256

    5233165c72533b728f7189f9f51f9b7ac2678586b93428bb917a38ff8eb97f06

    SHA512

    721078a4315993132701ee67e6387dd571508f1c54850c715008755e71b1942c3a41b4ff2e82de392fbc5713b973b90794a88897a17016205c08220f9ded515e

  • C:\Users\Infotmp.txt

    Filesize

    720B

    MD5

    9a86b418c86f9d13948065ec0ae19264

    SHA1

    01e5dd94a9a36a125816f3eec2af0c8d6bee3b8f

    SHA256

    a83f77a6010eb9550bcb668923c40022cd64ad8039f82a808a8a9c90a65c6ee8

    SHA512

    99b12506474656fff13b233af9bd27367d9f2bff10179a0992538259382a1c08d7abacbd4d7ff2effacd8b0a88389d2693a50fb1a2c944ac3b16568877fb7ac5

  • C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll

    Filesize

    83KB

    MD5

    89946df922e3ac9e727e2776b92a38da

    SHA1

    4f30513d9936fa7fff417d2280b1d2fa50dbf34c

    SHA256

    bfb545005626b4394cd42d9977d41a29d39b1bd45eca5a42f22cced712c623e8

    SHA512

    816511850a166ee3ed87baf2ccc5b8a8431120869762f4d2ce28173f54b77c3710c1f45345555aa8543238d89c31e49bd48c33c020aeb19d0ec29484e30c1ade

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    83KB

    MD5

    89946df922e3ac9e727e2776b92a38da

    SHA1

    4f30513d9936fa7fff417d2280b1d2fa50dbf34c

    SHA256

    bfb545005626b4394cd42d9977d41a29d39b1bd45eca5a42f22cced712c623e8

    SHA512

    816511850a166ee3ed87baf2ccc5b8a8431120869762f4d2ce28173f54b77c3710c1f45345555aa8543238d89c31e49bd48c33c020aeb19d0ec29484e30c1ade

  • memory/2516-142-0x0000000075840000-0x0000000075865000-memory.dmp

    Filesize

    148KB

  • memory/2516-143-0x0000000075840000-0x0000000075865000-memory.dmp

    Filesize

    148KB

  • memory/2516-145-0x0000000075840000-0x0000000075865000-memory.dmp

    Filesize

    148KB

  • memory/2640-132-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2640-146-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3468-136-0x00000000000D0000-0x00000000000F5000-memory.dmp

    Filesize

    148KB

  • memory/3468-137-0x00000000000D0000-0x00000000000F5000-memory.dmp

    Filesize

    148KB

  • memory/3468-138-0x00000000000D0000-0x00000000000F5000-memory.dmp

    Filesize

    148KB

  • memory/3468-139-0x00000000026D0000-0x00000000066D0000-memory.dmp

    Filesize

    64.0MB