Analysis

  • max time kernel
    200s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 03:51

General

  • Target

    df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe

  • Size

    322KB

  • MD5

    5cf41cd66c441e6f123e2a6ca31dfc94

  • SHA1

    252f08afc054e9ea7772d3509d746a333c852577

  • SHA256

    df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3

  • SHA512

    35a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456

  • SSDEEP

    6144:3KfcmBvK3G/IglKkaeJpM5/TuJ/TdnFMrdi4+OBA6OJieishfSyBmvwEN4Qk:3KEavQHYUeTO7k/TdFMrdi0A6OJie9fL

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe
    "C:\Users\Admin\AppData\Local\Temp\df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Program Files\system\svchost.exe
      "C:\Program Files\system\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:3112
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Program Files\system\svchost.bat""
        2⤵
          PID:960

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\system\svchost.bat
        Filesize

        254B

        MD5

        99328ab5f8dfa3409be286b432e361dd

        SHA1

        7f317ce632d252562ea7d1366e5f72d9410f3495

        SHA256

        15c1762901b6ba627b603d60051f9589fd51d393f6915009e57b105aee92b514

        SHA512

        1eb4437554f567fabba96c45def87fa48ab6474b8322ac52f9333e36c8afd97d979cbde39ada543cf50ea4fc47a7e098ad919688e9d73961de3d361eb972b369

      • C:\Program Files\system\svchost.exe
        Filesize

        322KB

        MD5

        5cf41cd66c441e6f123e2a6ca31dfc94

        SHA1

        252f08afc054e9ea7772d3509d746a333c852577

        SHA256

        df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3

        SHA512

        35a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456

      • C:\Program Files\system\svchost.exe
        Filesize

        322KB

        MD5

        5cf41cd66c441e6f123e2a6ca31dfc94

        SHA1

        252f08afc054e9ea7772d3509d746a333c852577

        SHA256

        df56d5bcfe60053f7d038231e389be9a4f645b718afefa0a725cd1ee882039f3

        SHA512

        35a7eece74c671ca42131f7af4d5717f53c0f0859cb5f55825128c9c16ba45ae2f6de65cf0b80eea24453a1e4e7d62abc4100bbaf8cfcbe553d37433ab2fb456

      • memory/960-144-0x0000000000000000-mapping.dmp
      • memory/2508-141-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2508-137-0x0000000000000000-mapping.dmp
      • memory/2508-140-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2508-142-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2508-143-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-136-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-135-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-132-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-134-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-145-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB

      • memory/2600-133-0x0000000000400000-0x00000000004C781C-memory.dmp
        Filesize

        798KB