Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:32

General

  • Target

    21cf7492c749388a4bebe5143d70a151.exe

  • Size

    241KB

  • MD5

    21cf7492c749388a4bebe5143d70a151

  • SHA1

    0ac3068b3e2359fcbcf4273bad8547f22adfaf40

  • SHA256

    6f4aad43a20cd9ec0ddeb500ad05be2381c2f630d4ceee8a52790d00508485a3

  • SHA512

    16c58813d3114a62f0125298ee56b3411da68a7478088865b17952509e06404cde825a9478c8f3774bfef127d86e26b76eee81d6fb241a7e35a19750adb38929

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRqm:352T3siXei5bcmP9JfUjWU

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21cf7492c749388a4bebe5143d70a151.exe
    "C:\Users\Admin\AppData\Local\Temp\21cf7492c749388a4bebe5143d70a151.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$$$$$.bat

    Filesize

    200B

    MD5

    68b6723229652a77c161f516cbc56ab8

    SHA1

    fc6babdd0b6926f868645c216f04ac62d1552735

    SHA256

    62bb11ab4f4eed03deafd8d1a951382b381f30502163613b3492a93673c76598

    SHA512

    94ca933f74613a97488755056055baf4381e60db9dac822b1c4b439166de31ace3f4d3ee5648538eb93a0473bbca1e40448d7d02ec2c925a3876a7edd661adb5

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    241KB

    MD5

    21cf7492c749388a4bebe5143d70a151

    SHA1

    0ac3068b3e2359fcbcf4273bad8547f22adfaf40

    SHA256

    6f4aad43a20cd9ec0ddeb500ad05be2381c2f630d4ceee8a52790d00508485a3

    SHA512

    16c58813d3114a62f0125298ee56b3411da68a7478088865b17952509e06404cde825a9478c8f3774bfef127d86e26b76eee81d6fb241a7e35a19750adb38929

  • memory/1896-7-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1896-707-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1896-826-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB