Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:48

General

  • Target

    235715797c0c7a4ce26826cb7db56e2c.exe

  • Size

    470KB

  • MD5

    235715797c0c7a4ce26826cb7db56e2c

  • SHA1

    502cc77e623a8ce3e241de0a90a3eb3b1bb74039

  • SHA256

    46fc41482aef7b563cf8c750e42afdadbc2d532a8181315b769a98af65116e65

  • SHA512

    bd13bbde087940125da8d25894cbf99a99b4fce9b0c937249c760113ba6cc40fc5b7d477ebcb04d04e0a2202505b82373e39f2b631cc724dca83ff11092a23ee

  • SSDEEP

    1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\235715797c0c7a4ce26826cb7db56e2c.exe
    "C:\Users\Admin\AppData\Local\Temp\235715797c0c7a4ce26826cb7db56e2c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\$$$$$.bat
      2⤵
      • Deletes itself
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$$$$$.bat

    Filesize

    200B

    MD5

    131db36c42982599fa0f287787efd31c

    SHA1

    b8d12ca73752bd0d30c68bb26c22c96cb96284d9

    SHA256

    d30bf26a3ad108c47d541c76ee4917fe6939e217174e2c4ee582e414d3a5bec3

    SHA512

    9b4aeaf7e0071b7a8063cda59cbe46983cc2431f53c9955abe1a11d02f9d121365f34f50ff5d0728cf85106cb538d745f785f846c6e1b001935fb2df857a2c9a

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    470KB

    MD5

    235715797c0c7a4ce26826cb7db56e2c

    SHA1

    502cc77e623a8ce3e241de0a90a3eb3b1bb74039

    SHA256

    46fc41482aef7b563cf8c750e42afdadbc2d532a8181315b769a98af65116e65

    SHA512

    bd13bbde087940125da8d25894cbf99a99b4fce9b0c937249c760113ba6cc40fc5b7d477ebcb04d04e0a2202505b82373e39f2b631cc724dca83ff11092a23ee

  • memory/3064-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3064-679-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3064-826-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB