Analysis

  • max time kernel
    120s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 01:46

General

  • Target

    22083089fa853f38663813db6bd4cf00_JC.exe

  • Size

    707KB

  • MD5

    22083089fa853f38663813db6bd4cf00

  • SHA1

    788cf42d5818d04b4bad48d68c74ff1750765878

  • SHA256

    e49040780306fe64a840bb15383833320d4c25250dacab1d85079770819e4844

  • SHA512

    32fb2b4a121d065f328d0b124ce70e9e337aace1ca4e407e73b3fe17c30b698c4a2a68c2d13c66445fd5dc3171ef2b8de921914d2a43f051ed515af677a2715d

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22083089fa853f38663813db6bd4cf00_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\22083089fa853f38663813db6bd4cf00_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
        PID:2320

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

            Filesize

            707KB

            MD5

            22083089fa853f38663813db6bd4cf00

            SHA1

            788cf42d5818d04b4bad48d68c74ff1750765878

            SHA256

            e49040780306fe64a840bb15383833320d4c25250dacab1d85079770819e4844

            SHA512

            32fb2b4a121d065f328d0b124ce70e9e337aace1ca4e407e73b3fe17c30b698c4a2a68c2d13c66445fd5dc3171ef2b8de921914d2a43f051ed515af677a2715d

          • \??\c:\$$$$$.bat

            Filesize

            206B

            MD5

            08dbce4fe96aac9a87ba4cb2399bb6a1

            SHA1

            f04aa96814d594a820cb43408203e56c42383525

            SHA256

            6fa923c79e1796646e554aba64a248dc3dd7751bc8dc041ab0e075ad84b96d93

            SHA512

            200cdbbac3661abc0855650625234f4b56a1f083a2799f0c018b656c31f0cfb7b27d2120e073dc75999f720430735914b3e9efbb75ce30a8e22854967bc35cca

          • memory/3996-0-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3996-449-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB

          • memory/3996-822-0x0000000000400000-0x000000000043F000-memory.dmp

            Filesize

            252KB