Analysis

  • max time kernel
    195s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 04:56

General

  • Target

    cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe

  • Size

    119KB

  • MD5

    38a8553384ce564f6ef1e551ecdf42d0

  • SHA1

    39035a968221109efb3c08ca1c35e0a175745092

  • SHA256

    cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616

  • SHA512

    17feb73a05b2d95ab16b1d8ab56041cf39668a45f1ed1a7c1f932660941b787148f641c3d14e2a762b9888aa04b3b4941cee4241f93b65fc63039979aa5c4d45

  • SSDEEP

    1536:cLqMk/alSnyucRNI19X7/B7n2i680WmleFsJlA5XwymMSGIq63AOY6ytwmfbgCt:cLpvVucRNolBngJW4eFUGJXK5ytH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
    "C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
      C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
        C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
          C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:3684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 304
          4⤵
          • Program crash
          PID:176
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 292
      2⤵
      • Program crash
      PID:4684
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4812 -ip 4812
    1⤵
      PID:1752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4252 -ip 4252
      1⤵
        PID:3540

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

        Filesize

        119KB

        MD5

        bbe198fb08cafd58fb20d5e90c09013d

        SHA1

        f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

        SHA256

        f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

        SHA512

        a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

      • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

        Filesize

        119KB

        MD5

        bbe198fb08cafd58fb20d5e90c09013d

        SHA1

        f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

        SHA256

        f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

        SHA512

        a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

      • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

        Filesize

        119KB

        MD5

        bbe198fb08cafd58fb20d5e90c09013d

        SHA1

        f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

        SHA256

        f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

        SHA512

        a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

      • memory/1128-133-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1128-134-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1128-135-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/1128-138-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/3684-143-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB

      • memory/3684-144-0x0000000000400000-0x0000000000429000-memory.dmp

        Filesize

        164KB