Analysis

  • max time kernel
    302s
  • max time network
    359s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 14:09

General

  • Target

    de86562823bb41221ee1a2f1b74308403fb8b89269edcc9fab2614303852f9a9.exe

  • Size

    163KB

  • MD5

    02ee0d7972cab52d2fd3c852ec6cf96c

  • SHA1

    cb92190445553256c77acaefbe4fcd6ee665497c

  • SHA256

    de86562823bb41221ee1a2f1b74308403fb8b89269edcc9fab2614303852f9a9

  • SHA512

    f819c04de275dcee15f097a6d2e77e69398a10a82883c094618dfad583b54c5b7eff046977b404dac321cc2e99c32ea917dc8890269f02ae3b40bb254f9a36a8

  • SSDEEP

    3072:MShenRkhBbWQwHOMF0nDRh2u/m+lu1RCxx3XpAr5+JjP0pHs9M3Hs07VbV+R0j:thgRkhg9LCL2rUx3XpAtWSX3Hs07Lz

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de86562823bb41221ee1a2f1b74308403fb8b89269edcc9fab2614303852f9a9.exe
    "C:\Users\Admin\AppData\Local\Temp\de86562823bb41221ee1a2f1b74308403fb8b89269edcc9fab2614303852f9a9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\kbakcf.dll",GetLogInfo
      2⤵
      • Loads dropped DLL
      PID:808
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\kbakcf.dll",GetLogInfo
      2⤵
      • Loads dropped DLL
      PID:5004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\kbakcf.dll",GetLogInfo
      2⤵
      • Loads dropped DLL
      PID:2288
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\kbakcf.dll",GetLogInfo
      2⤵
      • Loads dropped DLL
      PID:1236
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Roaming\kbakcf.dll",GetLogInfo
      2⤵
      • Loads dropped DLL
      PID:480

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • C:\Users\Admin\AppData\Roaming\kbakcf.dll

          Filesize

          163KB

          MD5

          72aae17819c61c5c2d5062ed74c37d8f

          SHA1

          60f2bf7c7cda8ff912cb6fd1670a505645f3da0b

          SHA256

          80979e5d13c124513ec6bfe2e030b51c734fbcbd06d81244350939d7f50e354e

          SHA512

          1bec6b6d1b52158add5c9daea5c20bc93826c0ceed2939f87228e188420f4b42963c3a053acd607032bbd8e5ce444685115b100f08f91fa4dfb22b8e2989d104

        • memory/480-156-0x00000000027C0000-0x00000000027EC000-memory.dmp

          Filesize

          176KB

        • memory/808-158-0x00000000023A0000-0x00000000023CC000-memory.dmp

          Filesize

          176KB

        • memory/1236-155-0x0000000001EF0000-0x0000000001F1C000-memory.dmp

          Filesize

          176KB

        • memory/2272-132-0x0000000000590000-0x00000000005A3000-memory.dmp

          Filesize

          76KB

        • memory/2272-138-0x0000000000590000-0x00000000005A3000-memory.dmp

          Filesize

          76KB

        • memory/2272-133-0x0000000000B50000-0x0000000000B7C000-memory.dmp

          Filesize

          176KB

        • memory/2288-154-0x00000000026B0000-0x00000000026DC000-memory.dmp

          Filesize

          176KB

        • memory/2288-174-0x00000000009E0000-0x00000000009F3000-memory.dmp

          Filesize

          76KB

        • memory/5004-157-0x0000000002C20000-0x0000000002C4C000-memory.dmp

          Filesize

          176KB