Analysis
-
max time kernel
72s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
18-05-2023 03:42
Static task
static1
Behavioral task
behavioral1
Sample
64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe
Resource
win10-20230220-en
General
-
Target
64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe
-
Size
4.7MB
-
MD5
2a543fa908ad0a6c1cf5e6a2c653bd9b
-
SHA1
010004a5dbf8a78c5e61a534a110366fd2a0875c
-
SHA256
64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92
-
SHA512
1a0d91b4737f2ffe4b68623f363f084f395c269dbe2ad0fd91592b17df475a78e9f7866c1cda597934e4c1c0481f3df5b4bd92260903bc40a0b026ec27b4d99e
-
SSDEEP
49152:RDhUAqnxU0EzbMCJmq6qaW4i4mPH6+KggxI4tRUc4yARXpwPTZ8KAj0tyAu:7IcstSyAdpwLZ8sdu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3952 MicrosoftDesktop-ver8.9.2.9.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run 64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe Set value (str) \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftDesktop-ver8.9.2.9 = "C:\\ProgramData\\MicrosoftDesktop-ver8.9.2.9\\MicrosoftDesktop-ver8.9.2.9.exe" 64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3992 wrote to memory of 3952 3992 64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe 66 PID 3992 wrote to memory of 3952 3992 64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe"C:\Users\Admin\AppData\Local\Temp\64c5bd47fe2bdad7c9d94c49e87dde4ba814c6ae5c8eb484363f36dc6feebe92.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\ProgramData\MicrosoftDesktop-ver8.9.2.9\MicrosoftDesktop-ver8.9.2.9.exeC:\ProgramData\MicrosoftDesktop-ver8.9.2.9\MicrosoftDesktop-ver8.9.2.9.exe2⤵
- Executes dropped EXE
PID:3952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
754.7MB
MD57cd7fab512a63c1e3de45112f6abfc11
SHA196b02330cafc158b50e7418aad0998dbf2a7e30c
SHA25619828282df99b9d8b9a8d457ed5a64d120595d64bf40092c4fbd48e7398f09a6
SHA512eea9dfa83820c7eb2bfc37cdfab31d682369e4b77c6b8675ef326566b21d28d8d6a49bf001b0b7bf7d09075feba44ff7ad6ed9ecd7d5a31d2e7a532e91798744
-
Filesize
754.7MB
MD57cd7fab512a63c1e3de45112f6abfc11
SHA196b02330cafc158b50e7418aad0998dbf2a7e30c
SHA25619828282df99b9d8b9a8d457ed5a64d120595d64bf40092c4fbd48e7398f09a6
SHA512eea9dfa83820c7eb2bfc37cdfab31d682369e4b77c6b8675ef326566b21d28d8d6a49bf001b0b7bf7d09075feba44ff7ad6ed9ecd7d5a31d2e7a532e91798744