Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2023 11:06

General

  • Target

    b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe

  • Size

    7.0MB

  • MD5

    ea1aededc8a182bb29ef29adc349451e

  • SHA1

    4e2786e2b09ffce8585dde47e66f3fc567947b0e

  • SHA256

    b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b

  • SHA512

    16a2048e20abdbef0bc35c56f22c13abac139c4d09f73d67311819be0ac84bcc66ab94e5493ec61ec00341b63d71414787e0d79f3027ed6867dadff119980310

  • SSDEEP

    98304:Hbbqjl0pzd20zdSe+lsPWF3A8Qa8XxIXJTsKCY/H8TP62nbxzLj8N2Es3pU:Q0NdLSe+lsuF3ATEJGY/czjb9a2EsW

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe
    "C:\Users\Admin\AppData\Local\Temp\b60b483dc2a83b6b94032c5e7c7b1e910650ce32e1ae137ce96302ea7cf1097b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe
      C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe
      2⤵
      • Executes dropped EXE
      PID:1836

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe
    Filesize

    757.0MB

    MD5

    79dd598609dfe928b7f3940cae592c01

    SHA1

    7f4e0280e3197a529c5e53a98adf2cf2e4c2b022

    SHA256

    f849ccce87a1c759f4e4522909fc04d47ea6cf93f00a6a53aff5cba628cc7086

    SHA512

    55d1b1deb528e26f3b02fdafee15dc4f73b52c791a2e766bfa54bcbdb2d3c40287dfada28b9f88202e7804169901b5eb6dcf22a0706857092e24aee06b3a26ff

  • C:\ProgramData\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3\WindowsHolographicDevicesregid.1991-06.com.microsoft-RL78.6.2.3.exe
    Filesize

    757.0MB

    MD5

    79dd598609dfe928b7f3940cae592c01

    SHA1

    7f4e0280e3197a529c5e53a98adf2cf2e4c2b022

    SHA256

    f849ccce87a1c759f4e4522909fc04d47ea6cf93f00a6a53aff5cba628cc7086

    SHA512

    55d1b1deb528e26f3b02fdafee15dc4f73b52c791a2e766bfa54bcbdb2d3c40287dfada28b9f88202e7804169901b5eb6dcf22a0706857092e24aee06b3a26ff

  • memory/1836-138-0x00007FF6E5750000-0x00007FF6E5E4E000-memory.dmp
    Filesize

    7.0MB

  • memory/3032-133-0x00007FF7528E0000-0x00007FF752FDE000-memory.dmp
    Filesize

    7.0MB