Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 01:40

General

  • Target

    3e0496f93891698d71ee644055f9c950exe_JC.exe

  • Size

    704KB

  • MD5

    3e0496f93891698d71ee644055f9c950

  • SHA1

    b955afeaedd5fe4d9db11ac866a75b198b4080e0

  • SHA256

    54e2a0a7f4350265a4ec45cd012925cb68a11bf94d30fcd944153b28f2f91dbf

  • SHA512

    d929c39f7088a57ec0adc0f46ca9da0109d95471f778efbd80f39bd71f8e49663d126599ba6d02e6dd5558e4b271407a4b593c2ccf885d1995516f83a9453143

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e0496f93891698d71ee644055f9c950exe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\3e0496f93891698d71ee644055f9c950exe_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:3244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

      Filesize

      704KB

      MD5

      3e0496f93891698d71ee644055f9c950

      SHA1

      b955afeaedd5fe4d9db11ac866a75b198b4080e0

      SHA256

      54e2a0a7f4350265a4ec45cd012925cb68a11bf94d30fcd944153b28f2f91dbf

      SHA512

      d929c39f7088a57ec0adc0f46ca9da0109d95471f778efbd80f39bd71f8e49663d126599ba6d02e6dd5558e4b271407a4b593c2ccf885d1995516f83a9453143

    • \??\c:\$$$$$.bat

      Filesize

      212B

      MD5

      eb1de28fdcb3b45346309fe007cf1bd8

      SHA1

      f279db7f3e9429e458e44f87d3a0092c58349287

      SHA256

      de9df246d13cb4e6d7fad2327f7aa3521b0e51165a7bdff202e44a4decdef238

      SHA512

      96648f9c9f3d2f40a4fcf200aac02802a1a571aad0fca62e7dccd138b58711c8d15765b25ea5e887c7278a87eeb36698d6144f0844489827ca1c1ed750668b60

    • memory/4612-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4612-487-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4612-821-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB