Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:47

General

  • Target

    76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe

  • Size

    119KB

  • MD5

    c28c6697c8f8600e685f654fc2a4d93c

  • SHA1

    cb18df976406a5fb05d2dde781802bbc96fbf449

  • SHA256

    76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703

  • SHA512

    e294f3ade6aecc52ad77e4e256533d5d4a47e13e0182f127fc872585865fe2e366f4dea1f171f63c25c1d1418607d5d471e765370d6f8512ae7e2ea836eb838c

  • SSDEEP

    3072:2i9LGd2q6kfXlSO5CRp3uCoIMiJS7Weh4Gec9:XNO+kfXMpLtRJS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe
        "C:\Users\Admin\AppData\Local\Temp\76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4648
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

      Filesize

      48KB

      MD5

      9c14b6bd24a0634f52e7878326f7350d

      SHA1

      c5468a61b3ea97ba8309162282bfd004df35047e

      SHA256

      013b8178c495b9d02640a6b657fa4995a7e29d8292a56c34b529e7dabe70922b

      SHA512

      8a5d54e790c3c96c197026c07c851389b44a77a1008f129bb1690080708f562b6ac0726982c1110d96c00227ef20181f8749e20ba91da2c6d62371b2a09f8df6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

      Filesize

      48KB

      MD5

      9c14b6bd24a0634f52e7878326f7350d

      SHA1

      c5468a61b3ea97ba8309162282bfd004df35047e

      SHA256

      013b8178c495b9d02640a6b657fa4995a7e29d8292a56c34b529e7dabe70922b

      SHA512

      8a5d54e790c3c96c197026c07c851389b44a77a1008f129bb1690080708f562b6ac0726982c1110d96c00227ef20181f8749e20ba91da2c6d62371b2a09f8df6

    • memory/2556-138-0x000000007FFC0000-0x000000007FFC6000-memory.dmp

      Filesize

      24KB

    • memory/4628-132-0x0000000000000000-mapping.dmp

    • memory/4628-135-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4628-136-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/4628-137-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/4628-139-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB