Analysis

  • max time kernel
    159s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 14:59

General

  • Target

    f27df4100a96cb04fe905f86db3427fba77595c796fd02e6045bec1e7ba195a6.exe

  • Size

    668KB

  • MD5

    3169f9270b590d9fb83596ec91d94871

  • SHA1

    14eac6faddb7ae4900e686d3c0f90e5d278bfbff

  • SHA256

    f27df4100a96cb04fe905f86db3427fba77595c796fd02e6045bec1e7ba195a6

  • SHA512

    a359190d7b8720ce0a82f2f1f184cc17649c721d6eb39f8513b6c06299ac92c661321d7d67e33eab5d575849b60e6ee297f1a7dbb026933c41be814f54547b79

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f27df4100a96cb04fe905f86db3427fba77595c796fd02e6045bec1e7ba195a6.exe
    "C:\Users\Admin\AppData\Local\Temp\f27df4100a96cb04fe905f86db3427fba77595c796fd02e6045bec1e7ba195a6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3164

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            fb813994cf51bdb0b72b8258b7b666ba

            SHA1

            3955d4d0a3296e6692d28859ff749422ca665fc3

            SHA256

            ac38ef4abfe55d0503709f21065e29739d2fb34792b113011287d1507c7da124

            SHA512

            a48521a392a2c7fa9d6b9fa36af0c0526114d90302d26ac3fbd586c6f711f56077bde0bd1f3a87e0012d13dce54c453809a113c6b11560857919c23a831d2974

          • memory/1200-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1200-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1200-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB