Resubmissions

23-01-2024 13:08

240123-qdgfrsbda9 10

23-01-2024 12:28

240123-pnlmssagf6 10

Analysis

  • max time kernel
    138s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2024 12:28

General

  • Target

    vcredist_x64.exe

  • Size

    14.5MB

  • MD5

    a57667e57017d7714af565f8a605520b

  • SHA1

    48e3744f33f49113be971e334754f1e475c5afaa

  • SHA256

    42a559f2be251b5f3c685597b99e4dee763b16a01f70bd7b1e92f6eb91cbb80c

  • SHA512

    987305caf39341f8fbcb5c3489bde73d8d0c88aa517995029f6a86d62b513c5aef8b175acee35f540717adc5e02b8098a30b88dcfce448b6cb2a77b1527689aa

  • SSDEEP

    393216:AlptVYmfr7yBG/4ZHYkfjTpPUWpYKg4HTNZl/V:cpttD7yBG/MppPUgYKg4zN//V

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vcredist_x64.exe
    "C:\Users\Admin\AppData\Local\Temp\vcredist_x64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\vcredist_x64.exe
      "C:\Users\Admin\AppData\Local\Temp\vcredist_x64.exe" -burn.unelevated BurnPipe.{E3F1ADE8-1B0F-4BB3-9917-C650825DDE4A} {B73E370D-8A0A-4276-9B57-76C3B75EE3EC} 1616
      2⤵
      • Loads dropped DLL
      PID:3584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{95ac1cfa-f4fb-4d1b-8912-7f9d5fbb140d}\.ba1\1049\license.rtf

    Filesize

    173KB

    MD5

    02bb82a1b7fd10f4bc25f30dc7c51560

    SHA1

    cd33810ca5aa36320e255b56c1e9af64465f0319

    SHA256

    d050dce48fb874c777e08a90f85e00a174752e2d060b9e0e3ebc800bbfb59708

    SHA512

    556a6710af23008d96f9fdf40168f17536656ec27e6704fe51161272ee76ae3d7682a758d443d9c7120bb823809bd3dcfb13b2448a5095f918414913b6d8927a

  • C:\Users\Admin\AppData\Local\Temp\{95ac1cfa-f4fb-4d1b-8912-7f9d5fbb140d}\.ba1\logo.png

    Filesize

    1KB

    MD5

    d6bd210f227442b3362493d046cea233

    SHA1

    ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

    SHA256

    335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

    SHA512

    464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

  • C:\Users\Admin\AppData\Local\Temp\{95ac1cfa-f4fb-4d1b-8912-7f9d5fbb140d}\.ba1\wixstdba.dll

    Filesize

    126KB

    MD5

    a973cfa4951d519e032f42dc98a198b0

    SHA1

    2ba0f1e1570bc2d84f9824d58e77b9192ea5dd94

    SHA256

    25ee85c14c9be619b4f0bf783963ace1dc0af0e802014728c2a2ca8da213d31d

    SHA512

    b4a8c4f08a51bdd9ce7708fe8e2477182a52f1d853954eb5af0430c2df99839b6076a7d93b00391a73d446a6ad9da3ed77ef79c8b23353d32c72fc540415b8ef