Analysis

  • max time kernel
    94s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 04:23

General

  • Target

    6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da.exe

  • Size

    411KB

  • MD5

    721af4dcda17f229482d4fe6ab044c8a

  • SHA1

    5c8da5b5c42f4868e42a39dfd5d09f68d181dffb

  • SHA256

    6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da

  • SHA512

    8f0087daf0de7c07d67768848cfd918bd269a37048722b32472d4db81921d1e0582c6b11ca00e11a2c905d1d334d1eaf11ccaa883bb3d27781003f4e5fa721ca

  • SSDEEP

    6144:9GK72ZpFpQ+kqVqd0b+bpq5beuldHHnbs2:9pAzOfqVqdJEFZdnw2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da.exe
    "C:\Users\Admin\AppData\Local\Temp\6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2500
    • C:\Users\Admin\AppData\Local\Temp\6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da.exe
      "C:\Users\Admin\AppData\Local\Temp\6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe
        "C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe
          "C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4968
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /i:4968
            5⤵
              PID:1876
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe" /i:4968
              5⤵
                PID:3132

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe

        Filesize

        411KB

        MD5

        721af4dcda17f229482d4fe6ab044c8a

        SHA1

        5c8da5b5c42f4868e42a39dfd5d09f68d181dffb

        SHA256

        6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da

        SHA512

        8f0087daf0de7c07d67768848cfd918bd269a37048722b32472d4db81921d1e0582c6b11ca00e11a2c905d1d334d1eaf11ccaa883bb3d27781003f4e5fa721ca

      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe

        Filesize

        411KB

        MD5

        721af4dcda17f229482d4fe6ab044c8a

        SHA1

        5c8da5b5c42f4868e42a39dfd5d09f68d181dffb

        SHA256

        6313d69524ac481b704d72bf4f6d7b65a10710b5daa6a39e08026559f7e589da

        SHA512

        8f0087daf0de7c07d67768848cfd918bd269a37048722b32472d4db81921d1e0582c6b11ca00e11a2c905d1d334d1eaf11ccaa883bb3d27781003f4e5fa721ca

      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe

        Filesize

        411KB

        MD5

        b1e994be03e86aa100fc065363cb2b12

        SHA1

        31f285d8ea16c63e86b9f47fab759bf2f4bc0b6e

        SHA256

        99655c67af2ab305495ab94fc7cbd820384a9d3685ae120e98f5d4dba281e24a

        SHA512

        2c8b2c64794a11b60837f4fe3b99680883bdf60923517be293e0010ced2e191638c43933bb9ea26f96d8da155439b5d5bbc223b755b1e03f468300060ac11ed0

      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe

        Filesize

        411KB

        MD5

        b1e994be03e86aa100fc065363cb2b12

        SHA1

        31f285d8ea16c63e86b9f47fab759bf2f4bc0b6e

        SHA256

        99655c67af2ab305495ab94fc7cbd820384a9d3685ae120e98f5d4dba281e24a

        SHA512

        2c8b2c64794a11b60837f4fe3b99680883bdf60923517be293e0010ced2e191638c43933bb9ea26f96d8da155439b5d5bbc223b755b1e03f468300060ac11ed0

      • C:\ProgramData\waMX3p9TiSdYxPXX\W81BNSpLFtMlszQt.exe

        Filesize

        411KB

        MD5

        b1e994be03e86aa100fc065363cb2b12

        SHA1

        31f285d8ea16c63e86b9f47fab759bf2f4bc0b6e

        SHA256

        99655c67af2ab305495ab94fc7cbd820384a9d3685ae120e98f5d4dba281e24a

        SHA512

        2c8b2c64794a11b60837f4fe3b99680883bdf60923517be293e0010ced2e191638c43933bb9ea26f96d8da155439b5d5bbc223b755b1e03f468300060ac11ed0

      • C:\Users\Admin\AppData\Local\Temp\AfrHgeCFT.exe

        Filesize

        411KB

        MD5

        b1e994be03e86aa100fc065363cb2b12

        SHA1

        31f285d8ea16c63e86b9f47fab759bf2f4bc0b6e

        SHA256

        99655c67af2ab305495ab94fc7cbd820384a9d3685ae120e98f5d4dba281e24a

        SHA512

        2c8b2c64794a11b60837f4fe3b99680883bdf60923517be293e0010ced2e191638c43933bb9ea26f96d8da155439b5d5bbc223b755b1e03f468300060ac11ed0

      • C:\Users\Admin\AppData\Local\Temp\AfrHgeCFT.exe

        Filesize

        411KB

        MD5

        b1e994be03e86aa100fc065363cb2b12

        SHA1

        31f285d8ea16c63e86b9f47fab759bf2f4bc0b6e

        SHA256

        99655c67af2ab305495ab94fc7cbd820384a9d3685ae120e98f5d4dba281e24a

        SHA512

        2c8b2c64794a11b60837f4fe3b99680883bdf60923517be293e0010ced2e191638c43933bb9ea26f96d8da155439b5d5bbc223b755b1e03f468300060ac11ed0

      • memory/3132-159-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3884-142-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3884-136-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3884-135-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3884-134-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/3884-133-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/4968-150-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/4968-151-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB

      • memory/4968-158-0x0000000000400000-0x000000000045E000-memory.dmp

        Filesize

        376KB