Analysis

  • max time kernel
    103s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 15:35

General

  • Target

    dff23d13665928640be73d25435be884039783514a541963a7c5d5356d417bea.exe

  • Size

    3.5MB

  • MD5

    02d703d2f7623046eaa34268b3587ba2

  • SHA1

    141c8f4960c05580eb7e7d8732c5cd2817e109a2

  • SHA256

    dff23d13665928640be73d25435be884039783514a541963a7c5d5356d417bea

  • SHA512

    fa7ae7fc91a8b3ea78e453ec70a64ddcdef5f6b8d3f885fea75e83951dbc18602f3c104c2fb0f790953de1eba86080f2b2f2cbbbfefebc094f0790f80c6d980c

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dff23d13665928640be73d25435be884039783514a541963a7c5d5356d417bea.exe
    "C:\Users\Admin\AppData\Local\Temp\dff23d13665928640be73d25435be884039783514a541963a7c5d5356d417bea.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2020

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            53af2c420e3876c4a95bc86676c0133d

            SHA1

            f8a8abf4dea4614764373dca53dbe938349d5d95

            SHA256

            811cb0ebd1962c214bfe31e18a8e3514d67e839fd9808e59f70a3aa7eb19e3e4

            SHA512

            eb19a94437d4fd7deb68984470cfb9f0d064f95ac9a3f8dbf7e96d702f423bf72b9d81f9a5a0e39894237cb94f7bc6aab1fda34fe958989415ca063a0275cdec

          • memory/2276-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2276-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/2276-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB