Analysis

  • max time kernel
    84s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 11:44

General

  • Target

    84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe

  • Size

    4.4MB

  • MD5

    91102404fbdf1cbf2a2a9a8889c66deb

  • SHA1

    dc3237c792ff0b62c5d2c93b6916ae15ea98ae7e

  • SHA256

    84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e

  • SHA512

    aa8d8023930fb6b472ad7af18c6690838eaf52e76aec9a920468f0a80c9b1d1a34d5a39098c1ac30b1012a52db4594f18d8b7460bebaa8b347e8daa52224335c

  • SSDEEP

    98304:Mc31RBC96etJeZ3G9LWme1lZW03xLiSJOIQMEy8PyEpzVQa/H1YMlJ:d/+64JeBILWmeLw03dRJpP8PHb/HNJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe
    "C:\Users\Admin\AppData\Local\Temp\84ae6ad18f67766c58eeab49c3bf04570603f8093b76e985c0d222eb6355a28e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe
        "C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe"
        3⤵
        • Executes dropped EXE
        PID:1440

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe

          Filesize

          638.5MB

          MD5

          e71efa429955203196cd1005b91fabd8

          SHA1

          cb9d572eb70e333a5d92eba0666458d31faaeaa8

          SHA256

          6525390c24722c66ea5b804fa0a158bbed70a2db65c41a4bd2689733d34fed6a

          SHA512

          821b14370106e7d22767b7427a4455aee2e25ea6f7b3573b93563b6fd6cd64f2a778335a1de5dc8500fbecf2ab5dd42230b7a6d7f052d03b8dd8717c108ac36f

        • C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe

          Filesize

          640.1MB

          MD5

          3c871813c1b917f9d2167b347a04af5e

          SHA1

          bbaab9a68582cc8b9ef045b993cd64994053cd54

          SHA256

          1c936a3858a47f343278769001121bb159c85da15cb1846f2a75e2fbd000d745

          SHA512

          261dcb67c05a4f1a54c3daba0532ec56bd37359a473a786f13383a54d47c779fe121bbfea518d1a38113bb7504a3ac3b44749b760d9e164ad1adc87180f63e0d

        • C:\ProgramData\PackagesMicrosoft-Type4.2.4.6\PackagesMicrosoft-Type4.2.4.6.exe

          Filesize

          667.4MB

          MD5

          dbbf2679ac297aa5ea2a2f681b45b95e

          SHA1

          8575dfdc742638145d2c0390482f5ae51f2ffa07

          SHA256

          6e8f8813185f3491ea333ef3f02f0224cd5245b2acf9ac151ad5db67bb0a30d3

          SHA512

          f2b6e12cfe863bfd360830743512025e41580572dc04e3a3360d793583bac2c21f3fa49527076c2d8b293cd082554165ccb1de1578b114612391fcb88f57e99a

        • memory/2160-134-0x0000000000400000-0x000000000085C000-memory.dmp

          Filesize

          4.4MB

        • memory/2160-139-0x0000000005990000-0x0000000005F34000-memory.dmp

          Filesize

          5.6MB

        • memory/2160-140-0x00000000053E0000-0x0000000005472000-memory.dmp

          Filesize

          584KB

        • memory/2160-141-0x00000000053A0000-0x00000000053AA000-memory.dmp

          Filesize

          40KB

        • memory/2160-142-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB

        • memory/2160-143-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB

        • memory/2160-144-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB

        • memory/2160-145-0x0000000005620000-0x0000000005630000-memory.dmp

          Filesize

          64KB