Analysis

  • max time kernel
    91s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 15:38

General

  • Target

    b4c73878e145223dbc75f048676b48edf96ef5608ff3a491da34e55d621fa940.exe

  • Size

    3.9MB

  • MD5

    02bc8f2347e2df6beed1b32d8e66ce55

  • SHA1

    cd75697824ad8cc3adc51a7a6322ae2590f084c4

  • SHA256

    b4c73878e145223dbc75f048676b48edf96ef5608ff3a491da34e55d621fa940

  • SHA512

    a98c075ab59cf2f018bac37644e606af4e72513297bec193def91fd7f10ea85e134b66f76628d17bf0032652c2cc02a6c959ca292b4d202524bdf3ee48e08380

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c73878e145223dbc75f048676b48edf96ef5608ff3a491da34e55d621fa940.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c73878e145223dbc75f048676b48edf96ef5608ff3a491da34e55d621fa940.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:176

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat
      Filesize

      264B

      MD5

      9bed26f74b7a65dc9939bb58aebd8819

      SHA1

      6d1a888165d5829c180133cb0556fd9f78a6a3d9

      SHA256

      6e13dc057c0d26552d0e56fde38c22dc3ed0c4581a1d64a72ba8674925e966db

      SHA512

      4ee745f54ebded515aa822fb2e03e85110fdb701c22d22843782e9a59e6d093e1a67fbd8129b3bbb24aff00fbc2e478380e0f665dae431c1d92a092a743b9cae

    • memory/176-134-0x0000000000000000-mapping.dmp
    • memory/4872-132-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/4872-133-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/4872-135-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB