Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 06:13

General

  • Target

    b3fc50146803244f3c4223079f98fb26.exe

  • Size

    15KB

  • MD5

    b3fc50146803244f3c4223079f98fb26

  • SHA1

    c55c32c325c19737ad6f5de8057e0f51ae133533

  • SHA256

    4f4e041170e31ceefdf3ee4e9b6e63ff327e781da698c8fc03c68fef8d58cf1f

  • SHA512

    5a1cf5844145c223bacd9775f461c856d041620a2b8647acaf10be5bf8e34101a827eff33de486143e79c52bfbb7882a378a09dc60ace0937cfd251fc3eb76b9

  • SSDEEP

    384:m8W/WoiGOu1TlaKDXf/haSAsw6vBmw6zhQ+16frbbn7:VKJbh2sw6dit16zT

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3fc50146803244f3c4223079f98fb26.exe
    "C:\Users\Admin\AppData\Local\Temp\b3fc50146803244f3c4223079f98fb26.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat
      2⤵
        PID:3820
    • C:\Windows\SysWOW64\BA71D467.EXE
      C:\Windows\SysWOW64\BA71D467.EXE -k
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:3076

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\BA71D467.EXE

            Filesize

            15KB

            MD5

            b3fc50146803244f3c4223079f98fb26

            SHA1

            c55c32c325c19737ad6f5de8057e0f51ae133533

            SHA256

            4f4e041170e31ceefdf3ee4e9b6e63ff327e781da698c8fc03c68fef8d58cf1f

            SHA512

            5a1cf5844145c223bacd9775f461c856d041620a2b8647acaf10be5bf8e34101a827eff33de486143e79c52bfbb7882a378a09dc60ace0937cfd251fc3eb76b9

          • C:\Windows\SysWOW64\delme.bat

            Filesize

            211B

            MD5

            26ce4217f57d8e64ead008cce5cc5a5d

            SHA1

            7f56c1149878931729464795a954913a14dca080

            SHA256

            deb2ebee0c863b5a5e66f14332d3f7b18ce03f675004e1d773263494ca3308a7

            SHA512

            07dbbe534390bb0f41383d4ba74c54c62e50eaa0c4de60e7b13e83027fc770ebdc442f88cdaf98e9b14786696c830c54e02163dfd501ea17c96ef20c08e5fcde

          • memory/3076-5-0x00000000004B0000-0x00000000004B1000-memory.dmp

            Filesize

            4KB

          • memory/3076-11-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/3280-0-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB

          • memory/3280-1-0x0000000000470000-0x0000000000471000-memory.dmp

            Filesize

            4KB

          • memory/3280-9-0x0000000000400000-0x0000000000417000-memory.dmp

            Filesize

            92KB