Analysis
-
max time kernel
84s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe
Resource
win10v2004-20230220-en
General
-
Target
84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe
-
Size
4.4MB
-
MD5
91102404fbdf1cbf2a2a9a8889c66deb
-
SHA1
dc3237c792ff0b62c5d2c93b6916ae15ea98ae7e
-
SHA256
84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e
-
SHA512
aa8d8023930fb6b472ad7af18c6690838eaf52e76aec9a920468f0a80c9b1d1a34d5a39098c1ac30b1012a52db4594f18d8b7460bebaa8b347e8daa52224335c
-
SSDEEP
98304:Mc31RBC96etJeZ3G9LWme1lZW03xLiSJOIQMEy8PyEpzVQa/H1YMlJ:d/+64JeBILWmeLw03dRJpP8PHb/HNJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 PackagesMicrosoft-Type4.2.4.6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PackagesMicrosoft-Type4.2.4.6 = "C:\\ProgramData\\PackagesMicrosoft-Type4.2.4.6\\PackagesMicrosoft-Type4.2.4.6.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4148 set thread context of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4148 wrote to memory of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 PID 4148 wrote to memory of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 PID 4148 wrote to memory of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 PID 4148 wrote to memory of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 PID 4148 wrote to memory of 2160 4148 84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe 86 PID 2160 wrote to memory of 1440 2160 AppLaunch.exe 98 PID 2160 wrote to memory of 1440 2160 AppLaunch.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe"C:\Users\Admin\AppData\Local\Temp\84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe"C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe"3⤵
- Executes dropped EXE
PID:1440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
638.5MB
MD5e71efa429955203196cd1005b91fabd8
SHA1cb9d572eb70e333a5d92eba0666458d31faaeaa8
SHA2566525390c24722c66ea5b804fa0a158bbed70a2db65c41a4bd2689733d34fed6a
SHA512821b14370106e7d22767b7427a4455aee2e25ea6f7b3573b93563b6fd6cd64f2a778335a1de5dc8500fbecf2ab5dd42230b7a6d7f052d03b8dd8717c108ac36f
-
Filesize
640.1MB
MD53c871813c1b917f9d2167b347a04af5e
SHA1bbaab9a68582cc8b9ef045b993cd64994053cd54
SHA2561c936a3858a47f343278769001121bb159c85da15cb1846f2a75e2fbd000d745
SHA512261dcb67c05a4f1a54c3daba0532ec56bd37359a473a786f13383a54d47c779fe121bbfea518d1a38113bb7504a3ac3b44749b760d9e164ad1adc87180f63e0d
-
Filesize
667.4MB
MD5dbbf2679ac297aa5ea2a2f681b45b95e
SHA18575dfdc742638145d2c0390482f5ae51f2ffa07
SHA2566e8f8813185f3491ea333ef3f02f0224cd5245b2acf9ac151ad5db67bb0a30d3
SHA512f2b6e12cfe863bfd360830743512025e41580572dc04e3a3360d793583bac2c21f3fa49527076c2d8b293cd082554165ccb1de1578b114612391fcb88f57e99a