Analysis

  • max time kernel
    204s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 22:27

General

  • Target

    8b8049ad33c141bb949122fa4dae9a114bc4bf7b5aa2a8f755880261c8557075.exe

  • Size

    661KB

  • MD5

    d7abee2c5d61d4b09dae79a045f43de0

  • SHA1

    cece4024f346556b2c8eb33ef0fb7cf078458dac

  • SHA256

    8b8049ad33c141bb949122fa4dae9a114bc4bf7b5aa2a8f755880261c8557075

  • SHA512

    3f6cd4ad54a62f556390712d8da0f50faa21d2b247881aeae531fcf6a4be2e85ac77bc26659018742ed8b06c26ab6891e34d8b7ba1636b0c8bf75b35a4cb81f4

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b8049ad33c141bb949122fa4dae9a114bc4bf7b5aa2a8f755880261c8557075.exe
    "C:\Users\Admin\AppData\Local\Temp\8b8049ad33c141bb949122fa4dae9a114bc4bf7b5aa2a8f755880261c8557075.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2712

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            c49389f530e8a9f58abccff606c8dacb

            SHA1

            6890875cfc803745c4720be511307d2a21ca342c

            SHA256

            dad72d0cb6cd050d69793a5f308c50984cd55ce32aab690e9acc71f49699dad1

            SHA512

            6ef966ef49665b019addab49adf26db3bc712fd27e2fa14398b7e99f825f91f55a5c213fd23e652c399f2e39c93e8b7c2dd2ec65ccb0671b6c6d117e8bc0688d

          • memory/1480-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1480-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/1480-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB