Analysis

  • max time kernel
    91s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 22:42

General

  • Target

    90219c69b173fbeff9e7097b40d188e39759a50b90c6fba09b2e735c2de4f798.exe

  • Size

    454KB

  • MD5

    34ac900b30398907222718a80294aafd

  • SHA1

    a72a66977fe30f62f32f2665d3fffddb2343f40a

  • SHA256

    90219c69b173fbeff9e7097b40d188e39759a50b90c6fba09b2e735c2de4f798

  • SHA512

    4c0e9506e313364a6ee63d831089251109becb37dde802fb94be4ab34ae0e12431e9b9ffcc96150bbbf97db759778ada15e0fc09d1edf3380b401419c5fdfe66

  • SSDEEP

    3072:7+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNV:aZmqt6Qyiy3b6CR10TY8JOArF9S9x

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90219c69b173fbeff9e7097b40d188e39759a50b90c6fba09b2e735c2de4f798.exe
    "C:\Users\Admin\AppData\Local\Temp\90219c69b173fbeff9e7097b40d188e39759a50b90c6fba09b2e735c2de4f798.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:4856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      30c75e6a30841342dbb29adf02130d19

      SHA1

      647fd2d32a54b0e40eab4efb38e91e3155fc1caa

      SHA256

      a28bfb1d3b58fa5e1fec7b61f47d9da3329b08c2cab59f070863a810bb739abd

      SHA512

      c6b9950df4cf9e39ad6d000bd3e5e7f17948e363c4c09a1617c8f716ec2989adabc1d43ea469fba948f0a2e03237c102f09c9e8c42dd351f8acef102142c829d

    • memory/2736-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2736-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/2736-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB