Analysis

  • max time kernel
    91s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 19:28

General

  • Target

    3b420dd042777af290b2f615d3b8cc11034a3a591f783d80cce63513dbbff02e.exe

  • Size

    3.4MB

  • MD5

    070738e2025890cfc8af2b46c53bb0b8

  • SHA1

    f2d3d054fa4ceeb9b2a9302bc0b49e02c501805d

  • SHA256

    3b420dd042777af290b2f615d3b8cc11034a3a591f783d80cce63513dbbff02e

  • SHA512

    40f1b5d1536faba966d4b87cb377d6ac4a8fce0577e5ffe5f9530692ef068512cbab8b77dbd238383d88ec6d10a1d651a0d208bffbef06b934413abbf108fb95

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b420dd042777af290b2f615d3b8cc11034a3a591f783d80cce63513dbbff02e.exe
    "C:\Users\Admin\AppData\Local\Temp\3b420dd042777af290b2f615d3b8cc11034a3a591f783d80cce63513dbbff02e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:1840

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\$$$$$.bat

      Filesize

      264B

      MD5

      3e2e5a619592418f6f6f28771d9bebcc

      SHA1

      e60fb8d24adea7b581e85b9bf437010ebc349e0d

      SHA256

      854515681eb58baa1d37f11fc301341673539a536720c71b709eb8af440495b7

      SHA512

      b1116dccef106e483930139279ae3e795391861df37a1f3cea30e0423e5c0b2a8ae301167efa46817954ed672a30c9f38684f966996b759b7ae52a0bfff8cd00

    • memory/1840-134-0x0000000000000000-mapping.dmp

    • memory/3852-132-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3852-133-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3852-135-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB