Analysis

  • max time kernel
    180s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 06:53

General

  • Target

    51cc464722c619ea15ee91986116e37d146d8f087ef21acc49d5e5f50dc5dc86.exe

  • Size

    9KB

  • MD5

    0dfe84bb725c58c18f1f071160bbcdd0

  • SHA1

    38128b224bb3d5bef6b7d3dbd105cb06136b7a84

  • SHA256

    51cc464722c619ea15ee91986116e37d146d8f087ef21acc49d5e5f50dc5dc86

  • SHA512

    f79749d3a13bc35b50191bbae743c1f0b338f16abed1bd2cdbcf693559d28d2888c2fb1ef8aba38b676c007d5430f8a77051901577af1d2d0616d0006d67dbcd

  • SSDEEP

    192:5lZ22sERhaZd073uOwIRWsBpCXhDk0wSSqzKfqB:czOhaZd0L8IRWs7q4IEqB

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51cc464722c619ea15ee91986116e37d146d8f087ef21acc49d5e5f50dc5dc86.exe
    "C:\Users\Admin\AppData\Local\Temp\51cc464722c619ea15ee91986116e37d146d8f087ef21acc49d5e5f50dc5dc86.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\51cc464722c619ea15ee91986116e37d146d8f087ef21acc49d5e5f50dc5dc86.exe' enable
      2⤵
      • Modifies Windows Firewall
      PID:1312

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2220-133-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2220-134-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB