Analysis

  • max time kernel
    155s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 22:43

General

  • Target

    7b8c6ddde89e23ab59bbc216f3788d60b8d484df5b36b8ba0af3f7a6e5072702.exe

  • Size

    2.5MB

  • MD5

    03b0899890febf06ad22fdd0b02fdb6c

  • SHA1

    c41b91f4a8c4426c05de3fb431306cecd945a197

  • SHA256

    7b8c6ddde89e23ab59bbc216f3788d60b8d484df5b36b8ba0af3f7a6e5072702

  • SHA512

    c24dc824eff1a8a4abb57facc400c0fc71d180d735db2bd784fa037eb89c7f2bf50005d0cf9dfd954c10ac3bfde2879bee4b775565e0b42fdcf2bf95de516739

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b8c6ddde89e23ab59bbc216f3788d60b8d484df5b36b8ba0af3f7a6e5072702.exe
    "C:\Users\Admin\AppData\Local\Temp\7b8c6ddde89e23ab59bbc216f3788d60b8d484df5b36b8ba0af3f7a6e5072702.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4748

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      f2c7840746e124604a29d091c457d405

      SHA1

      7345c48e048eb8fd084f13cbb3ae7ad4b3956100

      SHA256

      576c60af97610a543166b7a377384d1c56264724e2e5de4a6e687f5a697e406b

      SHA512

      1838e321486004bcb24e6abf433257ea74cd9213b56362a96b2865fb5c193e87248e841f036db60171a9c78855833de77895165392d6441f3ef8c87272024cc8

    • memory/3604-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3604-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3604-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4748-134-0x0000000000000000-mapping.dmp