Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 01:51

General

  • Target

    14be7b6cc8c014515c031a72abe87930_JC.exe

  • Size

    724KB

  • MD5

    14be7b6cc8c014515c031a72abe87930

  • SHA1

    d9cf21900bd1c32a3c2a4855f7c8b4e3e3402ecc

  • SHA256

    cd4d05fde0ee3089da96417c5bb4faa5297bc5159218edca9ca4db029aed0827

  • SHA512

    510f1ec4c6fdfc4072f18d9acc42ca7856fe062b26dec084381df94bc3cf66aa325b629ba9fbc0bf97b0a8b2c3c1051d4271692ab4c97d3a8dc2b38545650b05

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14be7b6cc8c014515c031a72abe87930_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\14be7b6cc8c014515c031a72abe87930_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$$$$$.bat

    Filesize

    206B

    MD5

    4eae56b9ecf93794c804c70f5ba9507e

    SHA1

    b4b943b423020eb5bc1931c177d77f12bfe04f70

    SHA256

    731b65b5eb0a27e141a51ca21e96fe36a2f0fcc1c391f98b341e0cfb31e319a2

    SHA512

    37cfc892344aa6223017dc0f690966c9d8ed29f71e65f2c39f7ae26276d8353e532f92e2dc6e5043ac308654cb5066d447dc3ddeac5764104d068dadbfe53d51

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    724KB

    MD5

    14be7b6cc8c014515c031a72abe87930

    SHA1

    d9cf21900bd1c32a3c2a4855f7c8b4e3e3402ecc

    SHA256

    cd4d05fde0ee3089da96417c5bb4faa5297bc5159218edca9ca4db029aed0827

    SHA512

    510f1ec4c6fdfc4072f18d9acc42ca7856fe062b26dec084381df94bc3cf66aa325b629ba9fbc0bf97b0a8b2c3c1051d4271692ab4c97d3a8dc2b38545650b05

  • \??\c:\$$$$$.bat

    Filesize

    206B

    MD5

    4eae56b9ecf93794c804c70f5ba9507e

    SHA1

    b4b943b423020eb5bc1931c177d77f12bfe04f70

    SHA256

    731b65b5eb0a27e141a51ca21e96fe36a2f0fcc1c391f98b341e0cfb31e319a2

    SHA512

    37cfc892344aa6223017dc0f690966c9d8ed29f71e65f2c39f7ae26276d8353e532f92e2dc6e5043ac308654cb5066d447dc3ddeac5764104d068dadbfe53d51

  • memory/1200-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1200-506-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1200-826-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB