Analysis

  • max time kernel
    192s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 21:03

General

  • Target

    a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

  • Size

    275KB

  • MD5

    43ffeada436ffce3ea901868413f7620

  • SHA1

    50054ebc6f88f3ab45771f3f3fb05d13e3019628

  • SHA256

    a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e

  • SHA512

    4bff350d3a683598d2282f7bb7e0832ba2f0db0441a9fcfc0a848f8871394e648314f6d89f2685646b791787d3fac524eb185ee7dd870c82e8f49cbacfc6d56f

  • SSDEEP

    3072:86jI9XJy7r9C88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfqy:fUZyo83nLbxKVJ3nCMkQe5HZAsHFZlxx

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
    "C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Drops file in Windows directory
      PID:3084
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev4A19.tmp!C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
        3⤵
        • Executes dropped EXE
        PID:672
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev4A19.tmp!C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE

    Filesize

    275KB

    MD5

    4eccbbcd45f7265eddffc5ca0f7fe9bc

    SHA1

    58aa92c48b859df78e32b16f6ca6c5caf397849f

    SHA256

    0e048674b10fff28b19cafea5a2195ea05d2a9ae35a28e8007718ba11643c733

    SHA512

    12bce0049bd70cd077b08d1c6998fc86ee40efd7854e2fce742cd48c455d9ad9999c042e50d9691a199dd769bda904c5b72f46cf40ac378a5928c1cd9b4b5b5f

  • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE

    Filesize

    275KB

    MD5

    4eccbbcd45f7265eddffc5ca0f7fe9bc

    SHA1

    58aa92c48b859df78e32b16f6ca6c5caf397849f

    SHA256

    0e048674b10fff28b19cafea5a2195ea05d2a9ae35a28e8007718ba11643c733

    SHA512

    12bce0049bd70cd077b08d1c6998fc86ee40efd7854e2fce742cd48c455d9ad9999c042e50d9691a199dd769bda904c5b72f46cf40ac378a5928c1cd9b4b5b5f

  • C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\dev4A19.tmp

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • memory/672-142-0x0000000000000000-mapping.dmp

  • memory/2768-144-0x0000000000000000-mapping.dmp

  • memory/2768-147-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3084-140-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3084-133-0x0000000000000000-mapping.dmp

  • memory/3084-150-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4776-141-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4776-136-0x0000000000000000-mapping.dmp

  • memory/4776-149-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5008-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5008-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB