Analysis

  • max time kernel
    87s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 20:41

General

  • Target

    e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe

  • Size

    275KB

  • MD5

    a3c31329eb8239a8b1b2a388adb31230

  • SHA1

    66b25fe652814c98e48245096296b4510837fcea

  • SHA256

    e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526

  • SHA512

    0b2f67873a30612ecf1e4003af7201981917f329ba0d90796e92a37dfa322f76108b2830e7874abf8b4fe131011ff04d8f42599126b05bb75bad3f5c73a5e584

  • SSDEEP

    3072:86jI9XJy7rIC88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfq/:fUZyb83nLbxKVJ3nCMkQe5HZAsHFZlxQ

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe
    "C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4372
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      PID:3692
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devA24F.tmp!C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE
        3⤵
        • Executes dropped EXE
        PID:1124
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devA24F.tmp!C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2236

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE

          Filesize

          275KB

          MD5

          1f22952b19665391bd64a6aab537f178

          SHA1

          a174402a75c546ac5a5ab238ddd0e41159a7c63c

          SHA256

          cd36dd9bdc8c441081864aee7b2699b47c0846de1d4a7c83238b1c0f5b7a95bc

          SHA512

          4bb7fd4ed9c344f860cd84dcce806463ab40ea026f9baca9ad6969231dead9a6c51a6b6e361c8e153d164b1e94acf7374e9ec4cb779d4759241e073c0602788c

        • C:\Users\Admin\AppData\Local\Temp\E302AE4B01295152E72936FBE5984612597AD7D66740D81F6BAB2F2B55665526.EXE

          Filesize

          275KB

          MD5

          1f22952b19665391bd64a6aab537f178

          SHA1

          a174402a75c546ac5a5ab238ddd0e41159a7c63c

          SHA256

          cd36dd9bdc8c441081864aee7b2699b47c0846de1d4a7c83238b1c0f5b7a95bc

          SHA512

          4bb7fd4ed9c344f860cd84dcce806463ab40ea026f9baca9ad6969231dead9a6c51a6b6e361c8e153d164b1e94acf7374e9ec4cb779d4759241e073c0602788c

        • C:\Users\Admin\AppData\Local\Temp\e302ae4b01295152e72936fbe5984612597ad7d66740d81f6bab2f2b55665526.exe

          Filesize

          236KB

          MD5

          d095376682210d6ddcaeb636500eb0cb

          SHA1

          f3ba099deee863c83f78e1814eb345b56560b11a

          SHA256

          06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

          SHA512

          546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          39KB

          MD5

          834329cc204fdd1ec364bfc1bf8e1b8c

          SHA1

          fa7f4df8ba394b3e5e18e8d3f83d487150636188

          SHA256

          50099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6

          SHA512

          d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1

        • C:\Windows\MSWDM.EXE

          Filesize

          39KB

          MD5

          834329cc204fdd1ec364bfc1bf8e1b8c

          SHA1

          fa7f4df8ba394b3e5e18e8d3f83d487150636188

          SHA256

          50099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6

          SHA512

          d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1

        • C:\Windows\MSWDM.EXE

          Filesize

          39KB

          MD5

          834329cc204fdd1ec364bfc1bf8e1b8c

          SHA1

          fa7f4df8ba394b3e5e18e8d3f83d487150636188

          SHA256

          50099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6

          SHA512

          d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1

        • C:\Windows\MSWDM.EXE

          Filesize

          39KB

          MD5

          834329cc204fdd1ec364bfc1bf8e1b8c

          SHA1

          fa7f4df8ba394b3e5e18e8d3f83d487150636188

          SHA256

          50099cba7967d8342d7200f0e595fc5389b96899715639f4f0446d378feedce6

          SHA512

          d2d3e9526840580bb9926ea1c13e820e0d33d86db92320d011f61a8cf5a05a1d0d601a20f95ed6c1b5bf22f38fc0e675d2e8faa93920a5c6a849aec41a43efe1

        • C:\Windows\devA24F.tmp

          Filesize

          236KB

          MD5

          d095376682210d6ddcaeb636500eb0cb

          SHA1

          f3ba099deee863c83f78e1814eb345b56560b11a

          SHA256

          06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

          SHA512

          546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

        • memory/2236-145-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/3692-148-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4372-138-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4372-132-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4796-147-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB