Analysis

  • max time kernel
    95s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 14:59

General

  • Target

    ebbdf377048e6d2d13a56518ddcbfb6d02ac3ef1582e29661283bbf362a72e5c.exe

  • Size

    479KB

  • MD5

    cc7379ae9d0d789ee3bb3e06ec560100

  • SHA1

    944cff206ecdaa336cada55841cfb1646f9ff80f

  • SHA256

    ebbdf377048e6d2d13a56518ddcbfb6d02ac3ef1582e29661283bbf362a72e5c

  • SHA512

    e1d249e13a93f2958ccd28c99a10b5bb0d429d011e1e3fb47bf1ff4af125eb8d3561d8d79028592109a3fbaeb4c83c25c47d84ab40dae2b733eb0c4e3fea35e9

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebbdf377048e6d2d13a56518ddcbfb6d02ac3ef1582e29661283bbf362a72e5c.exe
    "C:\Users\Admin\AppData\Local\Temp\ebbdf377048e6d2d13a56518ddcbfb6d02ac3ef1582e29661283bbf362a72e5c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:552

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\$$$$$.bat

            Filesize

            264B

            MD5

            e6d3aacac735d4a228387cb6053b08ee

            SHA1

            c552f6427a91f181ba29dec168d00057d0ebdbc7

            SHA256

            8695eecd6b60defccca21610e6e0350662303bb861a5d198e419d144fbb0baef

            SHA512

            9c5e168ee989b17950568484d3e1075472a40c1b7066d7df01737bdb426ff953b4b4069a1017194897569b504a7949664ac7ccc4cf1ce714d61ed275dbec3490

          • memory/5056-132-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/5056-133-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/5056-135-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB