Analysis

  • max time kernel
    4s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 16:57

General

  • Target

    3d6258aff21a972ac848fcbc0da64cf3.exe

  • Size

    96KB

  • MD5

    3d6258aff21a972ac848fcbc0da64cf3

  • SHA1

    10071a7805bbef129c549201a75cb812263536a6

  • SHA256

    e46e71e8c6cda6f143dfcc6a319badd0add38b3e25a4d6fddae59b17bd512ee4

  • SHA512

    71be70c461d02cd4b171b7f0c25220fe8f1eed3af27e9e0b14703ad158bf9771769639d1296c3ba2e472bc402373a05a11e6a37ebdca6e067cdcccaf6bd730ca

  • SSDEEP

    1536:BVsieIi8aA0a2uIU+OBTiaTJn8etNNOhj/85Wa1sqARs9LJK0R+:BRez8JPIU5Tlnrtv47qMoo0R+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 3 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe
    "C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "net start 51082"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2824
    • C:\Windows\SysWOW64\51082.exe
      C:\Windows\system32\51082.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:400
  • C:\Windows\SysWOW64\net.exe
    net start 51082
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 start 51082
      2⤵
        PID:4396
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 start 51082
      1⤵
        PID:2828
      • C:\Windows\SysWOW64\net.exe
        net start 51082
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3504
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "net start 51082"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3492
      • C:\Windows\SysWOW64\51082.exe
        C:\Windows\SysWOW64\51082.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Windows\SysWOW64\61CA1.exe
          C:\Windows\system32\61CA1.exe eee
          2⤵
          • Executes dropped EXE
          PID:4916
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start 51082
        1⤵
          PID:2852
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start 51082
          1⤵
            PID:4572
          • C:\Windows\SysWOW64\net.exe
            net start 51082
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1484
          • C:\Windows\SysWOW64\net.exe
            net start 51082
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2332
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "net start 51082"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1080
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "net start 51082"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:3860

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/400-8-0x00000000001D0000-0x00000000001D2000-memory.dmp

            Filesize

            8KB

          • memory/400-11-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB

          • memory/456-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

            Filesize

            8KB

          • memory/456-0-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB

          • memory/456-12-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB

          • memory/4624-14-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB

          • memory/4624-15-0x00000000001C0000-0x00000000001C2000-memory.dmp

            Filesize

            8KB

          • memory/4624-31-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB