Analysis

  • max time kernel
    157s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 22:27

General

  • Target

    8d10a0c23e7a0ac12c50d22a9e3f841f2260044d71b2ee7860ffafccb48cedaf.exe

  • Size

    1.0MB

  • MD5

    6f6a719c1a27a82e61776cdd5c030632

  • SHA1

    7b5c13d2be3458fbec0eb79fc51dc450bff05715

  • SHA256

    8d10a0c23e7a0ac12c50d22a9e3f841f2260044d71b2ee7860ffafccb48cedaf

  • SHA512

    d50b748b5c5e1d638191fdedf7035a039545ca23fd6c12d05d3c8f0660bbb2907ed007cc7bb5ed28f52814a78a0fee990ff8bd1acfddcddb6d192af78b1684a4

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d10a0c23e7a0ac12c50d22a9e3f841f2260044d71b2ee7860ffafccb48cedaf.exe
    "C:\Users\Admin\AppData\Local\Temp\8d10a0c23e7a0ac12c50d22a9e3f841f2260044d71b2ee7860ffafccb48cedaf.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:1532

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            bba3f6d8dcb83f5a90a0e28d13456719

            SHA1

            d9e44510c43545d3790cfdf0b7f7bf397fd5803e

            SHA256

            e42776fd5176943a99eb2fdcf88a401b8f50d7bc2548ca20b7e473bf52b5e2dc

            SHA512

            32c932e5689defdcfdc2960005305fa1dcc39c42fe68815566313b93b0809ef41297635c3b0885735ed6078460e67d7d3e839c9f11f095b1973cdd02b9921c35

          • memory/640-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/640-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/640-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB