Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 01:39

General

  • Target

    52a9f0973edc097272aaa11e8cefd000exe_JC.exe

  • Size

    1014KB

  • MD5

    52a9f0973edc097272aaa11e8cefd000

  • SHA1

    412069af40133506f677d246a1ee0244fdd33bab

  • SHA256

    fba06346823543c1e04269be0bb546c00184b50f42238232ff669f1d45717048

  • SHA512

    b3a2449b683ddac68680dd879942176565690634504559a40e893a030062c9effe993b8fe60bce04d1d738edea6b5a4faed77529c3a728b1d9492daf7c8a1f2d

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52a9f0973edc097272aaa11e8cefd000exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\52a9f0973edc097272aaa11e8cefd000exe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

      Filesize

      1014KB

      MD5

      52a9f0973edc097272aaa11e8cefd000

      SHA1

      412069af40133506f677d246a1ee0244fdd33bab

      SHA256

      fba06346823543c1e04269be0bb546c00184b50f42238232ff669f1d45717048

      SHA512

      b3a2449b683ddac68680dd879942176565690634504559a40e893a030062c9effe993b8fe60bce04d1d738edea6b5a4faed77529c3a728b1d9492daf7c8a1f2d

    • \??\c:\$$$$$.bat

      Filesize

      212B

      MD5

      cbd14b36f6c74f2525ce2e2e6860c2de

      SHA1

      717f1175f780e442c254afce8bfc7577294d6acc

      SHA256

      5391453ffb76d0d6fa2ad43d82a058add5079c851500b3f35574e47e86cb28a3

      SHA512

      d7ed253ffe0ec098e83d60fd41bbfcf769056590d96657834190cb6068ec94cecff5586f38eff41a8c4aecbe0ac27256164a0c812c0ff61cf6800b60ef113f45

    • memory/4028-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4028-414-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4028-821-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB