Analysis

  • max time kernel
    206s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 09:50

General

  • Target

    c2deff6218be4bb0352583511a17a52e715016b921a56f3f0166ff09d0b0e72e.exe

  • Size

    267KB

  • MD5

    4d39aeaf7e88ebd9c25b886db71cc776

  • SHA1

    1c2aa785a49f4ec5fc0df68fce47d1e43140b59f

  • SHA256

    c2deff6218be4bb0352583511a17a52e715016b921a56f3f0166ff09d0b0e72e

  • SHA512

    c2a498167f2aca5edf18a3eb29690e32c28cfd8d564ae28272b44ac9acaaa72b07967c5c3926efb7a7920a4f208382d39a1950e67daa6bfcbf63d8e6d5ea7ae6

  • SSDEEP

    3072:D22DPzPAzp6f9PboTde136OjAS7Vglkq+yUzsKOUqE617AYUJvAOVuRLa3Cmfj6+:a2bESbKM6J4ilsyZiq1sAOVu4NHwjH7o

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2deff6218be4bb0352583511a17a52e715016b921a56f3f0166ff09d0b0e72e.exe
    "C:\Users\Admin\AppData\Local\Temp\c2deff6218be4bb0352583511a17a52e715016b921a56f3f0166ff09d0b0e72e.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\syswow64\explorer.exe"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\svchost.exe
        -k netsvcs
        3⤵
          PID:3444

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/748-132-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/748-133-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2764-135-0x0000000000000000-mapping.dmp

    • memory/2764-136-0x0000000001360000-0x0000000001380000-memory.dmp

      Filesize

      128KB

    • memory/3444-137-0x0000000000000000-mapping.dmp

    • memory/3444-138-0x0000000000410000-0x0000000000430000-memory.dmp

      Filesize

      128KB

    • memory/3444-139-0x0000000000410000-0x0000000000430000-memory.dmp

      Filesize

      128KB