Analysis

  • max time kernel
    152s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/11/2022, 23:31

General

  • Target

    abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe

  • Size

    104KB

  • MD5

    0cca0a9d84e5abc0efaaca4b991d3602

  • SHA1

    891cf4fbcbf2df3c7e80daae493a9d73f2e1ae71

  • SHA256

    abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7

  • SHA512

    7306ea85c8ab6da241e9613ae879d8a382302594ca56aeb92427cfc19abfa00e10fbd963f9217b96a786118425ad100e91817d9fab60b8ab28b232b73a54d0fc

  • SSDEEP

    3072:og9R9vuSFtw+LMBR/EWu59Sv3bM/ykBYNb:oSXvRrwWeWWu5948ykBY9

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe
    "C:\Users\Admin\AppData\Local\Temp\abdfb45ec27bddc77e2918245a64d73f925c0702d6077ac2f8b4e731730bc2b7.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Adds Run key to start application
      PID:4320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\3565\cf69488d

    Filesize

    32B

    MD5

    37c6390dd905b3159cc5be0b513360df

    SHA1

    d1fc5d4c936a0e5d39492b8d8871a3ec551915a9

    SHA256

    30bfe203488ff6f7f275ae0c4187467599b1b9005f01e48edd95d0feb8b842b0

    SHA512

    cef48ef4725bd62ed5b4d36296fa047c48d842b6e9d5a2f16e9cbc11244cfa42088dd0cc47116c1c3a041c439026bb03a5ce73c2e3e05fae65d5efcffb526391

  • C:\Users\Admin\AppData\Roaming\-815183731

    Filesize

    206B

    MD5

    b366779414fea684c7406f32baca6674

    SHA1

    f30d27cf62880a4d07723b49cc83e263b1e0d86a

    SHA256

    52c2dd00b72ed57386df8d7c0aa2aa7de0c54a981f563a8299f6d6c48cbbe66b

    SHA512

    d37cfdbead10756d742bc157f602ab9a5e82ec87ba9b6bf025faf3f53f4625444e66b00c0d1f66e50b583c5ac5192c866acd550bfbaf369476fa65e2ddecb217

  • memory/2992-132-0x0000000000D10000-0x0000000000D1B000-memory.dmp

    Filesize

    44KB

  • memory/2992-140-0x0000000002A20000-0x0000000002A42000-memory.dmp

    Filesize

    136KB

  • memory/4320-143-0x0000000001710000-0x000000000172E000-memory.dmp

    Filesize

    120KB

  • memory/4320-144-0x0000000000BE0000-0x0000000000BEC000-memory.dmp

    Filesize

    48KB