Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 03:09

General

  • Target

    0204bb7d418b715226b4875a9436402e.exe

  • Size

    626KB

  • MD5

    0204bb7d418b715226b4875a9436402e

  • SHA1

    73ecbf75a0218d7753d970dce357f8ca2813f158

  • SHA256

    28fdd0612e2c3716cd09fb7c166b7b839c5aa0c4596189ee5fffdf92b57a6375

  • SHA512

    6cfd96cb5d18b2daa925e130c675e680b665f9e84a6ac8101b509752358727a99fe45c97721b0cb0682f4038bd4f57e73bd6309fceef747d2329d9dd1a0c42e7

  • SSDEEP

    3072:7+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNF:aZmqt6Qyiy3b6CR10TY8JOArF9S9

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0204bb7d418b715226b4875a9436402e.exe
    "C:\Users\Admin\AppData\Local\Temp\0204bb7d418b715226b4875a9436402e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$$$$$.bat

    Filesize

    200B

    MD5

    4e1d0b8ae589b66ea3f87dd0fb946ebc

    SHA1

    aa4e2ece3cce024c8d66f9f3eb0f123a28c52d96

    SHA256

    0926a8d09fa7ef9111da30e4d238bb07197b151026b0ec92571c6a531fc242c5

    SHA512

    ed6e1c97187a7f01e170c9281e09b7e0d588b9a54ca1c006be58dd24ea924f1b02ece32d5e8a35ea46bb07b1a891767ff00f77353a199a63c0cc674926c49e42

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    626KB

    MD5

    0204bb7d418b715226b4875a9436402e

    SHA1

    73ecbf75a0218d7753d970dce357f8ca2813f158

    SHA256

    28fdd0612e2c3716cd09fb7c166b7b839c5aa0c4596189ee5fffdf92b57a6375

    SHA512

    6cfd96cb5d18b2daa925e130c675e680b665f9e84a6ac8101b509752358727a99fe45c97721b0cb0682f4038bd4f57e73bd6309fceef747d2329d9dd1a0c42e7

  • memory/2976-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2976-701-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2976-826-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB