Analysis

  • max time kernel
    99s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 14:23

General

  • Target

    cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe

  • Size

    531KB

  • MD5

    a29b37fde6d90bb0a6e998ebd742a440

  • SHA1

    9add2fc923ef88a985e875183d66841b204fd328

  • SHA256

    cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d

  • SHA512

    b1fb42281445353708f2fef27c739c633a99bac99989d17095eeead0c6700a009fe79ba76359ebc02c311bd029799dfa2d7d0b67bb1f4c56f845cea5decf230d

  • SSDEEP

    6144:s4UHFnuDk67fe2tlw9ay6qOxLfPcvgKV1:6luDk67Q23zKz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:980
      • C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe
        "C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com
          C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com
          3⤵
          • Executes dropped EXE
          PID:4932

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com

            Filesize

            443KB

            MD5

            06e2a2bb74ba9155d103a74b18c85a5b

            SHA1

            0df9736a82d8d5be856b5f9c5062592ed9851627

            SHA256

            900fea254e92c734d6b2c91282aac9c1c92b75a23da0f5ab59f9ed8fa39c835c

            SHA512

            410d10755b4768ead46eae914cc53c6c4c96f17ca4b82dc3bed795c4cc2f31f15c1e6d668897ebc69ac69257eae8017b7347eefe7a8a1aab9fb75335abfb84d0

          • C:\Users\Admin\AppData\Local\Temp\cc0d47d11b3155651ded7aee8e6843f5d5d1e018a55f7263541a1c75c3ddee3d.com

            Filesize

            443KB

            MD5

            06e2a2bb74ba9155d103a74b18c85a5b

            SHA1

            0df9736a82d8d5be856b5f9c5062592ed9851627

            SHA256

            900fea254e92c734d6b2c91282aac9c1c92b75a23da0f5ab59f9ed8fa39c835c

            SHA512

            410d10755b4768ead46eae914cc53c6c4c96f17ca4b82dc3bed795c4cc2f31f15c1e6d668897ebc69ac69257eae8017b7347eefe7a8a1aab9fb75335abfb84d0