Resubmissions

25-01-2024 13:41

240125-qy6ldshegm 7

08-10-2023 17:09

231008-vn4fhaef3x 7

Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 17:09

General

  • Target

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe

  • Size

    244KB

  • MD5

    f93f91aca8e20bb97f94c05e5dd839e7

  • SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

  • SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

  • SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • SSDEEP

    3072:SQ6ZYZTzp+cavEcNQe9GQM/HhdFlQuq0/1fvZDqf6tHFzSfV91puBYYJCslb:n6s8ca7DGQM/HHFlQuTYZpylb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe
    "C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe"
    1⤵
    • Deletes itself
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_36667a5d.exe
      \??\C:\Users\Admin\AppData\Roaming\Custom_update\Update_36667a5d.exe
      2⤵
      • Executes dropped EXE
      PID:1688

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_36667a5d.exe
    Filesize

    244KB

    MD5

    f93f91aca8e20bb97f94c05e5dd839e7

    SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

    SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

    SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_36667a5d.exe
    Filesize

    244KB

    MD5

    f93f91aca8e20bb97f94c05e5dd839e7

    SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

    SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

    SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • memory/1144-0-0x0000022317DD0000-0x0000022317DF5000-memory.dmp
    Filesize

    148KB

  • memory/1144-1-0x0000022317E00000-0x0000022317E12000-memory.dmp
    Filesize

    72KB

  • memory/1144-5-0x00007FF72A540000-0x00007FF72A584000-memory.dmp
    Filesize

    272KB

  • memory/1144-6-0x0000022317E00000-0x0000022317E12000-memory.dmp
    Filesize

    72KB

  • memory/1688-7-0x0000020A02130000-0x0000020A02142000-memory.dmp
    Filesize

    72KB

  • memory/1688-9-0x0000020A02130000-0x0000020A02142000-memory.dmp
    Filesize

    72KB

  • memory/1688-10-0x0000020A02130000-0x0000020A02142000-memory.dmp
    Filesize

    72KB