Analysis
-
max time kernel
185s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2022, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe
Resource
win10v2004-20221111-en
General
-
Target
ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe
-
Size
79KB
-
MD5
ea02ff7618e819e4517ae4225031e763
-
SHA1
0a6c7cd2fd25f2d73edc58f3da2336d18599ebc8
-
SHA256
ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3
-
SHA512
efea6e114e9b8829b4b9e3e0128123a6241bea5f4988a8422c2c8c6e7af6d71c57ee5e19bfd7b7b9332f5e2eb04eba07e28a9deb18abc02dcbe6a6a918e47d68
-
SSDEEP
768:y0dpnF5/ija+1I+NYVawgYvCAvEZQ25AX94JosOy5upx/0LTWHiqZl84woTMejO8:rdJyqnvE3tJSbF0LiHi3ESUU2xaVm
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4160 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4160 2752 ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe 83 PID 2752 wrote to memory of 4160 2752 ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe 83 PID 2752 wrote to memory of 4160 2752 ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe 83 PID 4160 wrote to memory of 1244 4160 cmd.exe 85 PID 4160 wrote to memory of 1244 4160 cmd.exe 85 PID 4160 wrote to memory of 1244 4160 cmd.exe 85 PID 4160 wrote to memory of 5088 4160 cmd.exe 86 PID 4160 wrote to memory of 5088 4160 cmd.exe 86 PID 4160 wrote to memory of 5088 4160 cmd.exe 86 PID 4160 wrote to memory of 3816 4160 cmd.exe 87 PID 4160 wrote to memory of 3816 4160 cmd.exe 87 PID 4160 wrote to memory of 3816 4160 cmd.exe 87 PID 4160 wrote to memory of 3628 4160 cmd.exe 88 PID 4160 wrote to memory of 3628 4160 cmd.exe 88 PID 4160 wrote to memory of 3628 4160 cmd.exe 88 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 3816 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe"C:\Users\Admin\AppData\Local\Temp\ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\275245WQ.bat" "C:\Users\Admin\AppData\Local\Temp\ddc3206eae89bd6c15dcfc30ffad30de4d8e9d5f2122bc674115b3820979cdf3.exe""2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\mode.commode con:cols=52 lines=183⤵PID:1244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /ah /s/b3⤵PID:5088
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -h -s -a "C:\Users\Admin\AppData\Local\Temp\275245WQ.bat"3⤵
- Views/modifies file attributes
PID:3816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir/s/b3⤵PID:3628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD569d9e9b5d43cdf8ad7cd65e13581097f
SHA19fb2abd847053aab0259db934b6e95246152518b
SHA25635ac1198454a063f0ab7cadb8f52875d078472e1607720c785edb969ee5dd8cd
SHA5124ca8dbe12a39caf32a1e8d5533c79a2fe2f72e4501f36b8f91b7abb3797705ff4f3b859bf0b6b102351f618c6750c226e2433685b81ba9b82eb373375e51cbce
-
Filesize
30B
MD5d2d3191e05d36c27b597f78f5a03cd5c
SHA1c69303ec1d325c20ab82b8566acd2d5acea62f99
SHA256ec091741d014316c2afe977c445ab4039cc74aeb744acb4edc87783ed7572241
SHA5126dc06519a7d1706199f7a0019c71ec8712248f710746c3a68ffde36af372f4f583e990adde402d34975108ee00946e143f56655e69222b70fe57cc0d1cc0917f