Resubmissions

07/09/2024, 02:15

240907-cpk2fazenp 3

07/09/2024, 02:14

240907-cpa68szgpa 3

Analysis

  • max time kernel
    14s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 02:14

General

  • Target

    Monotone.exe

  • Size

    160KB

  • MD5

    cd6cddac2686df01814705f21e6da343

  • SHA1

    f29ad4efdc160ffba5cb63e01349ec9b84123e30

  • SHA256

    0f7f86530b7fa2e693a2a3a5bf69957e61c2f45d39418d077285a1ea6f4bb992

  • SHA512

    a673d521f316d3e0fa87a99effa33c5dc4fde315e72b7f6cbb828a94ffe8ebeed4bf9ca6fe858b3c69327aa4ce05ae02b37e2a392abb7cc728c4bbe2ab9a6de4

  • SSDEEP

    3072:yuo1MlSEqhqJhJy0WTHW69B9VjMdxPedN9ug0/9TBfsdZK0:y5oaqJhJMHW69B9VjMdxPedN9ug0/9Tk

Score
3/10

Malware Config

Signatures

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Monotone.exe
    "C:\Users\Admin\AppData\Local\Temp\Monotone.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\ABEF.tmp\ABF0.tmp\ABF1.bat C:\Users\Admin\AppData\Local\Temp\Monotone.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\system32\mode.com
        mode 80,20
        3⤵
          PID:3836
        • C:\Windows\system32\PING.EXE
          ping localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2900

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\ABEF.tmp\ABF0.tmp\ABF1.bat

            Filesize

            17KB

            MD5

            c5b9f5f77bee19857e4331300d080e3b

            SHA1

            50f5d39311cf12636d9ebe58aa4464578995f112

            SHA256

            a689ce9bdcdbc32ad39cbab6349453847a71a386cb4c4be4ffe2daff57fce52d

            SHA512

            ecb86677eb5bb0c0dc8b7c1d351cd7409772699393ebce902fcaa05442d46da112cfe8ca2215794ae2308c573d56fd51fd8920c488ff20c7b1c96cd7fced1dd1