Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2022, 15:02

General

  • Target

    88d466dc4481254f978ba674820a1b4a2b071c0441e79795780ab882221d833d.exe

  • Size

    648KB

  • MD5

    2e60309b60585d6a5850052add156dd0

  • SHA1

    bedbdef70830cefe45b113764a23675573802e8d

  • SHA256

    88d466dc4481254f978ba674820a1b4a2b071c0441e79795780ab882221d833d

  • SHA512

    8232ec7169cfb53338215f4b3b457cd63c4a8168085f1cc7851d41e22ad27a3269c023375ca40f8df8bf55c84c3bd0ae212198d73b150820c3ba2793d1b9f588

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqff:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88d466dc4481254f978ba674820a1b4a2b071c0441e79795780ab882221d833d.exe
    "C:\Users\Admin\AppData\Local\Temp\88d466dc4481254f978ba674820a1b4a2b071c0441e79795780ab882221d833d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4996

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      bac71cb6e094e035b535987c9c8b4f4e

      SHA1

      8c78809d3291c94da0767dbfb791b98ac07c13f9

      SHA256

      a066eb91f76565f8c071b58b74d73a6c89f8a157f94ee735c1085a6757381548

      SHA512

      aa0a4dd62decb6922064512ebd130de4c7f08969f15739bb6710ec664072d0a18f78b7612b22ef9e192a8367371881eb119e5b1555b90729cae57a3fadd875f4

    • memory/3612-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3612-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3612-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB