Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 15:33

General

  • Target

    20A565943964AC488DCCCCB0F12092DB.exe

  • Size

    343KB

  • MD5

    20a565943964ac488dccccb0f12092db

  • SHA1

    d9faa5107f89b543fe0514e2f04f2bb7ad38e176

  • SHA256

    ec4cb2623fbc85bc3aabcad5a1ea93966cc2e61c653b993fa5104021cd0f54f1

  • SHA512

    d033b52c8957a54ba4db5463cbfda607ad080861cce8c4d505bf5bdbd09bfe7a59b6d4af94514cd5b78c48fcf4739f9d2e46cd98c81097da6151e98454e6ab97

  • SSDEEP

    3072:DQ8Jstxp5/YDHh8fzYQYwRVyv6MIWoy+hdEdZTpDbexB7sg+Rhtk7v:UBxpkhFQt4v67oA6rgsrIL

Score
10/10

Malware Config

Signatures

  • Detected phishing page
  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20A565943964AC488DCCCCB0F12092DB.exe
    "C:\Users\Admin\AppData\Local\Temp\20A565943964AC488DCCCCB0F12092DB.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\syswow64\explorer.exe"
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\svchost.exe
        -k netsvcs
        3⤵
          PID:4312

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1500-134-0x0000000000000000-mapping.dmp
    • memory/1500-136-0x0000000000EC0000-0x0000000000EE5000-memory.dmp
      Filesize

      148KB

    • memory/4312-137-0x0000000000000000-mapping.dmp
    • memory/4312-138-0x0000000000750000-0x0000000000775000-memory.dmp
      Filesize

      148KB

    • memory/4312-139-0x0000000000750000-0x0000000000775000-memory.dmp
      Filesize

      148KB

    • memory/4828-132-0x0000000002190000-0x00000000021B2000-memory.dmp
      Filesize

      136KB

    • memory/4828-133-0x0000000000400000-0x0000000000459000-memory.dmp
      Filesize

      356KB

    • memory/4828-135-0x0000000000400000-0x0000000000425000-memory.dmp
      Filesize

      148KB