Analysis

  • max time kernel
    152s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:03

General

  • Target

    f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30.exe

  • Size

    327KB

  • MD5

    4496103fd2f55102cd6c4bcadd9172e0

  • SHA1

    82f977e9b2bb2c5aa8ebdd662bc37dba2dcd6626

  • SHA256

    f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30

  • SHA512

    b5df7f8f186363276b5eb1c9b054fce2db2c74f5352bf31483a63a81c9a16c1be126f3b1f3aa0df0f5a85575431a9c6c59b1df6893e82a09798ce45b014cbbc1

  • SSDEEP

    6144:fUZyAj8olritKpGmgXIaik9gvrmQGfMcIZnpYAHIe+cg/fpi:xiEKGLXIJkwrmrrIZpYAHnkY

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Program Files directory 33 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30.exe
    "C:\Users\Admin\AppData\Local\Temp\f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:1980
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev46BD.tmp!C:\Users\Admin\AppData\Local\Temp\f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:260
      • C:\Users\Admin\AppData\Local\Temp\F4AC9A4E862DC709D615A9B04078C7CA0B558C0DFC30857C6A5840401C2D7E30.EXE
        3⤵
        • Executes dropped EXE
        PID:4352
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev46BD.tmp!C:\Users\Admin\AppData\Local\Temp\F4AC9A4E862DC709D615A9B04078C7CA0B558C0DFC30857C6A5840401C2D7E30.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3720

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F4AC9A4E862DC709D615A9B04078C7CA0B558C0DFC30857C6A5840401C2D7E30.EXE
    Filesize

    327KB

    MD5

    0134c6d70b6183584681f22a30d02e01

    SHA1

    bd79f8327ac0dfc65df0053a65cf5164fbc15f17

    SHA256

    3a13ec3511e0fd43894c1cfd0b7befab27153d5babd3754bccef6a0e3f401417

    SHA512

    1f6b69b78d4ae3c45119e5278931d56202e4f94c1347b688a5bf2cb2563801b7575389651a627ee82b024c7f8c190ca8e75889ff68b5e914f7b63e5ac65fe116

  • C:\Users\Admin\AppData\Local\Temp\F4AC9A4E862DC709D615A9B04078C7CA0B558C0DFC30857C6A5840401C2D7E30.EXE
    Filesize

    327KB

    MD5

    0134c6d70b6183584681f22a30d02e01

    SHA1

    bd79f8327ac0dfc65df0053a65cf5164fbc15f17

    SHA256

    3a13ec3511e0fd43894c1cfd0b7befab27153d5babd3754bccef6a0e3f401417

    SHA512

    1f6b69b78d4ae3c45119e5278931d56202e4f94c1347b688a5bf2cb2563801b7575389651a627ee82b024c7f8c190ca8e75889ff68b5e914f7b63e5ac65fe116

  • C:\Users\Admin\AppData\Local\Temp\f4ac9a4e862dc709d615a9b04078c7ca0b558c0dfc30857c6a5840401c2d7e30.exe
    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • C:\WINDOWS\MSWDM.EXE
    Filesize

    39KB

    MD5

    e6c8169d9fede4b2d048dbdd73092edb

    SHA1

    78598f0fa85df9082a51d44a8b8b658492bd6e09

    SHA256

    3979f973a1a576bb9645e7269ad606cd093b8a20802fc2634249dc8285a54bd2

    SHA512

    8fa68956fd436bcb66845eb59a8e38838402304243a2670992c684b543885118a3ca232b7b2c166c649f528c533a7197fd42d72a954557aee816b51774c3a055

  • C:\Windows\MSWDM.EXE
    Filesize

    39KB

    MD5

    e6c8169d9fede4b2d048dbdd73092edb

    SHA1

    78598f0fa85df9082a51d44a8b8b658492bd6e09

    SHA256

    3979f973a1a576bb9645e7269ad606cd093b8a20802fc2634249dc8285a54bd2

    SHA512

    8fa68956fd436bcb66845eb59a8e38838402304243a2670992c684b543885118a3ca232b7b2c166c649f528c533a7197fd42d72a954557aee816b51774c3a055

  • C:\Windows\MSWDM.EXE
    Filesize

    39KB

    MD5

    e6c8169d9fede4b2d048dbdd73092edb

    SHA1

    78598f0fa85df9082a51d44a8b8b658492bd6e09

    SHA256

    3979f973a1a576bb9645e7269ad606cd093b8a20802fc2634249dc8285a54bd2

    SHA512

    8fa68956fd436bcb66845eb59a8e38838402304243a2670992c684b543885118a3ca232b7b2c166c649f528c533a7197fd42d72a954557aee816b51774c3a055

  • C:\Windows\MSWDM.EXE
    Filesize

    39KB

    MD5

    e6c8169d9fede4b2d048dbdd73092edb

    SHA1

    78598f0fa85df9082a51d44a8b8b658492bd6e09

    SHA256

    3979f973a1a576bb9645e7269ad606cd093b8a20802fc2634249dc8285a54bd2

    SHA512

    8fa68956fd436bcb66845eb59a8e38838402304243a2670992c684b543885118a3ca232b7b2c166c649f528c533a7197fd42d72a954557aee816b51774c3a055

  • C:\Windows\dev46BD.tmp
    Filesize

    288KB

    MD5

    e5f457e3d89281b97b099a757b4d9577

    SHA1

    aa8a49a5cfff30f5cdd23a7659b1c3ecdc734711

    SHA256

    ebcfea076a3bdca680525b5ce11e7d918cf574f800971a4ddd081f5a6069f0b8

    SHA512

    ffbb2880e10084c187a8dd3c42198782bc50a24886b2a8ee523b4c70a2dbb0b46ee1aa799f44bdd5129935d9d12b3c09e9566278b2f088ede8a39c6ec203663e

  • memory/260-136-0x0000000000000000-mapping.dmp
  • memory/260-149-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/260-143-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1980-150-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1980-142-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1980-133-0x0000000000000000-mapping.dmp
  • memory/3720-144-0x0000000000000000-mapping.dmp
  • memory/3720-147-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/4004-132-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/4004-138-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/4352-140-0x0000000000000000-mapping.dmp