Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 18:53

General

  • Target

    ffbaaf3d34ec05c9108c3444a1245599112ee70f527c3174899f133f5f5a325a.exe

  • Size

    381KB

  • MD5

    a3a770df8f0560ccd32fe23164b1dd60

  • SHA1

    be8d00e7e2ecda1a3aa7be34eb14294d91c8678c

  • SHA256

    ffbaaf3d34ec05c9108c3444a1245599112ee70f527c3174899f133f5f5a325a

  • SHA512

    1291cdfad78657789ed2bf99f6cb852e52e2a238c898bae67e7f9e7c69175514e4ae2cf8c21f56fc5ee6e61c3cb38197f99e919049b2bcde00569f33c097186c

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffbaaf3d34ec05c9108c3444a1245599112ee70f527c3174899f133f5f5a325a.exe
    "C:\Users\Admin\AppData\Local\Temp\ffbaaf3d34ec05c9108c3444a1245599112ee70f527c3174899f133f5f5a325a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4352

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            99b05fa70b73c485866412f6ef455955

            SHA1

            e28005daeebf3725b93a747ca41d56497d28ad36

            SHA256

            7db52cadb0c785a41c37a5ee9e780770ae3496b06440210d9195211b0484320d

            SHA512

            af1614cab6aa11e18c4cfb6fa110861ecc4d7f83484e7bf9f9f74ecd51941f6266bfec52339594a3c3fdd5bd3cab157bfdcbb666bf0bf54257872732511fc882

          • memory/4596-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4596-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/4596-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB