Analysis

  • max time kernel
    178s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:17

General

  • Target

    1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe

  • Size

    164KB

  • MD5

    5664b9abe1b27ac646d149a4e0383d3a

  • SHA1

    95ae306087d40d64757c8328d5ecad288025a254

  • SHA256

    1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170

  • SHA512

    478e753a03a9bcb5040acd1122d1f274cef481711d0e9858474c84f36e9dbdc5d5eddab5ee205ff3ab4d8a33872251f0d130ace7f12cf017efe510424576fb7e

  • SSDEEP

    3072:ASpYdBUSchnEDRjIs+IrRiSv4Z9QkDIUCeTxnMwwYeIfB4cOS8oCRcLYB3IMgHZp:1edBUSeWjwwRiMGDIUCe1nMwuIfB4cOy

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe
    "C:\Users\Admin\AppData\Local\Temp\1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\Hmelaa.exe
      C:\Windows\Hmelaa.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Hmelaa.exe

    Filesize

    164KB

    MD5

    5664b9abe1b27ac646d149a4e0383d3a

    SHA1

    95ae306087d40d64757c8328d5ecad288025a254

    SHA256

    1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170

    SHA512

    478e753a03a9bcb5040acd1122d1f274cef481711d0e9858474c84f36e9dbdc5d5eddab5ee205ff3ab4d8a33872251f0d130ace7f12cf017efe510424576fb7e

  • C:\Windows\Hmelaa.exe

    Filesize

    164KB

    MD5

    5664b9abe1b27ac646d149a4e0383d3a

    SHA1

    95ae306087d40d64757c8328d5ecad288025a254

    SHA256

    1be70aadab1048bf2cbf71ee7fdb951cf47f04065674e6ad83d114a670f5a170

    SHA512

    478e753a03a9bcb5040acd1122d1f274cef481711d0e9858474c84f36e9dbdc5d5eddab5ee205ff3ab4d8a33872251f0d130ace7f12cf017efe510424576fb7e

  • C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

    Filesize

    426B

    MD5

    fe2ad67a0cbb8f6890b7367518a44b2b

    SHA1

    c7bf87ed2b3f0a94eed826ccc49d64b4815dace1

    SHA256

    6d784ac1d5780494fcbe9afbf6260a20193b5011d8a7adf19c12eb62024e1de6

    SHA512

    719d352d088aa703d44759a8ff546c42a5abcc5489a6d17e7f1b30842775bba355ce83bd0630d7590293fb53db6e2949f54cf41a3c87395f27a97aec940afa62

  • memory/224-134-0x0000000000000000-mapping.dmp

  • memory/224-138-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/224-139-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2016-132-0x0000000000490000-0x000000000049E000-memory.dmp

    Filesize

    56KB

  • memory/2016-133-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/2016-140-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB