Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 15:39

General

  • Target

    b479ffac4ede98ae89e47d358b2ca077aa92c69ed16f87c6fc8c64ee3ce56450.exe

  • Size

    4.0MB

  • MD5

    011a29c4558f6df920a57cff5f6fb384

  • SHA1

    bc5a0ef6632616148ba37408f751b984baa8bb37

  • SHA256

    b479ffac4ede98ae89e47d358b2ca077aa92c69ed16f87c6fc8c64ee3ce56450

  • SHA512

    d05d3e1a760b16fe76326840d865e14904916568ddd1257f207edf7766f595b92dc7db29febd49e09cdb33a5bc6b94ff89e464ae5ebf0a88cd9fde022247afd1

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b479ffac4ede98ae89e47d358b2ca077aa92c69ed16f87c6fc8c64ee3ce56450.exe
    "C:\Users\Admin\AppData\Local\Temp\b479ffac4ede98ae89e47d358b2ca077aa92c69ed16f87c6fc8c64ee3ce56450.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:312

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat
      Filesize

      264B

      MD5

      56a8e49ec42fa7e955945e5ff83c3771

      SHA1

      cabad277a485da20e67ca4af3ea1338f3c66df1e

      SHA256

      eca30597b20ffac91f242bb19588742a1a806db21ae1284f2b9b9698b1b409b4

      SHA512

      68cbcd4963fbaaf04d5a5cbcb0588d8cc7ddd7d04832282348132e0de20b1edcb021fb4e4ba91b5f3434ee08563928ef18e6fb5d36938f2e622d9657f1ae1f23

    • memory/312-134-0x0000000000000000-mapping.dmp
    • memory/1992-132-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/1992-133-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/1992-135-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB