Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:06

General

  • Target

    6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe

  • Size

    150KB

  • MD5

    40ad08a727e110a5358e9de4e48beb8b

  • SHA1

    ecfd82bf3918c0d24f3006c8f145366a452c6de0

  • SHA256

    6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702

  • SHA512

    a386d002d0f128117de98baf4578453eb518b9a6d21298661752356243d336c6f24806cd1531c356388e22dac77d09e154f27070cc8a0570720ef73858008200

  • SSDEEP

    1536:N1O/esjj4EaaiLn/DZHBOgCXhUbkf1IPiK5NhCXhiIuOH5Y+q1jGJyVZGC86jOr8:NBmj4+yD143UO1UiEGL76+qFWyVg6R

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe
    "C:\Users\Admin\AppData\Local\Temp\6a961de239e84808c61b25a3d8e9212788b7ac116b7ca267fdd2be7a7865f702.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • Adds Run key to start application
      PID:1044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1044-134-0x0000000000000000-mapping.dmp

  • memory/1044-135-0x0000000000860000-0x000000000086E000-memory.dmp

    Filesize

    56KB

  • memory/1044-136-0x0000000000D70000-0x0000000000D81000-memory.dmp

    Filesize

    68KB

  • memory/1044-137-0x0000000001590000-0x0000000001610000-memory.dmp

    Filesize

    512KB

  • memory/1044-138-0x0000000001590000-0x0000000001610000-memory.dmp

    Filesize

    512KB

  • memory/1532-132-0x00000000005F0000-0x0000000000604000-memory.dmp

    Filesize

    80KB