Analysis

  • max time kernel
    94s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 00:46

General

  • Target

    9ba1f11f7fc86a514fac4b9321560812f0f50c97653f79c33bc76f8ec98a58a5.exe

  • Size

    172KB

  • MD5

    45bf987c5be91c0de406d62370e8c049

  • SHA1

    811d1dbebb5668afe15ef15acdfa2cd8656de341

  • SHA256

    9ba1f11f7fc86a514fac4b9321560812f0f50c97653f79c33bc76f8ec98a58a5

  • SHA512

    c8177113b85d33aa2eb487669f5ef934a1d2c83259e1c3292def9d34258bcd064463a4c698a921db77b503ba01e65cf156c935fff0f20865fbd5635088634997

  • SSDEEP

    3072:6MobR7ezAjLOZvmX1e5GWp1icKAArDZz4N9GhbkrNEk1Ozu:neR7eammap0yN90QEZ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ba1f11f7fc86a514fac4b9321560812f0f50c97653f79c33bc76f8ec98a58a5.exe
    "C:\Users\Admin\AppData\Local\Temp\9ba1f11f7fc86a514fac4b9321560812f0f50c97653f79c33bc76f8ec98a58a5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c "setup.bat"
      2⤵
        PID:3488

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.bat

            Filesize

            5KB

            MD5

            796174b7c38609f2a7caca1585af490f

            SHA1

            cc42bec5693c5e85be84732036c27c6dd004ff17

            SHA256

            da7fc46277cc7ae89f17c84fd136423c84fbb17fcf65b30610e9e37686622b17

            SHA512

            8b0ae87ae813cdccf23cf6959c4844a8f5988b729d6f097a027aa1c0193149633d0f2a70c627026792c9e63925973884e8ecc36249d9d0d41bfa644501c2b9e2