Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2024 00:44

General

  • Target

    70fd6802627d319aa8c735a2ddf76e4f.exe

  • Size

    152KB

  • MD5

    70fd6802627d319aa8c735a2ddf76e4f

  • SHA1

    58f977d9879aadc64ffc9485852140922df5dcbc

  • SHA256

    fff85a6ec67c92863803c9323cd453845a182b6595672cac13368726be558ced

  • SHA512

    b757525d5ee99e5d1a79b6d3c09c3b2a978c59406555400e61b57c61894de438a88c537fea07fa8d873157f4355015e07bc382221c92cf8e7d66e8b22c5d588b

  • SSDEEP

    3072:2H1sRlpc6j1GQutQ5bb+utqNt2rRS3Y/gJzJfOJx6X:2HKznRSK5byM8AwYufVX

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe
    "C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D
        3⤵
        • Views/modifies file attributes
        PID:3116
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a %TEMP%\*.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\Users\Admin\AppData\Local\Temp\*.exe
        3⤵
        • Views/modifies file attributes
        PID:4316
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a %WINDIR%\TEMP\*.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\Windows\TEMP\*.exe
        3⤵
        • Views/modifies file attributes
        PID:4788
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a "%USERPROFILE%\*.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a "C:\Users\Admin\*.exe"
        3⤵
        • Views/modifies file attributes
        PID:1000
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C DEL C:\RECYCLER\*.exe /F /S /Q
      2⤵
        PID:4932
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C DEL %TEMP%\*.exe /F /Q
        2⤵
          PID:972
        • C:\Windows\SysWOW64\CMD.exe
          CMD /C DEL %WINDIR%\TEMP\*.exe /F /Q
          2⤵
            PID:2632
          • C:\Windows\SysWOW64\CMD.exe
            CMD /C DEL "%USERPROFILE%\*.exe" /F /Q
            2⤵
              PID:3740

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Defense Evasion

          Hide Artifacts

          1
          T1564

          Hidden Files and Directories

          1
          T1564.001

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4068-0-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/4068-1-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/4068-2-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/4068-3-0x0000000002070000-0x0000000002074000-memory.dmp
            Filesize

            16KB

          • memory/4068-4-0x0000000002080000-0x0000000002081000-memory.dmp
            Filesize

            4KB

          • memory/4068-6-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/4068-8-0x0000000002070000-0x0000000002074000-memory.dmp
            Filesize

            16KB

          • memory/4068-10-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/4068-16-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB