Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/12/2022, 15:43 UTC

General

  • Target

    dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe

  • Size

    425KB

  • MD5

    de8e739e054e0ee9cb3d6f803d957419

  • SHA1

    12cdd7253215512183847ff8c7f7b17a7426c32c

  • SHA256

    dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3

  • SHA512

    09781fde0c514e0d16474e2e94c5f17db5e39b46d1a70653b89d3cc45310bf958c4258ea542148b13c977fffee54acde1048b26da643dc7a05f405db13858ec9

  • SSDEEP

    12288:xCpSZaPeLADixs3Vj7YWOVNqN+sILUZGGQjQ:3gP2AGsFj7tOVNeILUZGGQj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 25 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
    "C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
      C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
        C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
        3⤵
        • Modifies WinLogon for persistence
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4864
        • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
          C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
          4⤵
          • Modifies WinLogon for persistence
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
            C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
            5⤵
            • Modifies WinLogon for persistence
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1492
            • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
              C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
              6⤵
              • Modifies WinLogon for persistence
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4564
              • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                7⤵
                • Modifies WinLogon for persistence
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:3816
                • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                  C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                  8⤵
                  • Modifies WinLogon for persistence
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:3512
                  • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                    C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                    9⤵
                    • Modifies WinLogon for persistence
                    • Adds Run key to start application
                    • Suspicious use of WriteProcessMemory
                    PID:1788
                    • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                      C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                      10⤵
                      • Modifies WinLogon for persistence
                      • Adds Run key to start application
                      • Suspicious use of WriteProcessMemory
                      PID:2348
                      • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                        C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                        11⤵
                        • Modifies WinLogon for persistence
                        • Adds Run key to start application
                        • Suspicious use of WriteProcessMemory
                        PID:1164
                        • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                          C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                          12⤵
                          • Modifies WinLogon for persistence
                          • Adds Run key to start application
                          • Suspicious use of WriteProcessMemory
                          PID:1040
                          • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                            C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                            13⤵
                            • Modifies WinLogon for persistence
                            • Adds Run key to start application
                            • Suspicious use of WriteProcessMemory
                            PID:2368
                            • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                              C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                              14⤵
                              • Modifies WinLogon for persistence
                              • Adds Run key to start application
                              • Suspicious use of WriteProcessMemory
                              PID:948
                              • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                15⤵
                                • Modifies WinLogon for persistence
                                • Adds Run key to start application
                                • Suspicious use of WriteProcessMemory
                                PID:2356
                                • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                  C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                  16⤵
                                  • Modifies WinLogon for persistence
                                  • Adds Run key to start application
                                  • Suspicious use of WriteProcessMemory
                                  PID:912
                                  • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                    C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                    17⤵
                                    • Modifies WinLogon for persistence
                                    • Adds Run key to start application
                                    • Suspicious use of WriteProcessMemory
                                    PID:476
                                    • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                      C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                      18⤵
                                      • Modifies WinLogon for persistence
                                      • Adds Run key to start application
                                      • Suspicious use of WriteProcessMemory
                                      PID:64
                                      • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                        C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                        19⤵
                                        • Modifies WinLogon for persistence
                                        • Adds Run key to start application
                                        • Suspicious use of WriteProcessMemory
                                        PID:3364
                                        • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                          C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                          20⤵
                                          • Modifies WinLogon for persistence
                                          • Adds Run key to start application
                                          • Suspicious use of WriteProcessMemory
                                          PID:540
                                          • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                            C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                            21⤵
                                            • Modifies WinLogon for persistence
                                            • Adds Run key to start application
                                            • Suspicious use of WriteProcessMemory
                                            PID:628
                                            • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                              C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                              22⤵
                                              • Modifies WinLogon for persistence
                                              • Adds Run key to start application
                                              • Suspicious use of WriteProcessMemory
                                              PID:992
                                              • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                23⤵
                                                • Modifies WinLogon for persistence
                                                • Adds Run key to start application
                                                PID:2328
                                                • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                  C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                  24⤵
                                                  • Modifies WinLogon for persistence
                                                  • Adds Run key to start application
                                                  PID:2988
                                                  • C:\Users\Admin\AppData\Local\Temp\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                    C:\Users\Admin\AppData\Local\Temp\\dd2d6f1aa1f4020a4ab99788c989d4791a8ade596ebab31de0d1fd0d6116d7b3.exe
                                                    25⤵
                                                    • Modifies WinLogon for persistence
                                                    • Adds Run key to start application
                                                    PID:1472

Network

    No results found
  • 8.238.110.126:80
    322 B
    7
  • 13.89.179.10:443
    322 B
    7
  • 8.238.110.126:80
    322 B
    7
  • 8.238.110.126:80
    322 B
    7
  • 8.238.110.126:80
    322 B
    7
  • 8.247.210.254:80
    46 B
    40 B
    1
    1
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.