Resubmissions

17-03-2021 08:48

210317-xv9yl2r5hn 10

16-03-2021 19:29

210316-6pes49a322 8

Analysis

  • max time kernel
    111s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-03-2021 19:29

General

  • Target

    e00743a06378fdc48df81c57ff27c80c.exe

  • Size

    799KB

  • MD5

    e00743a06378fdc48df81c57ff27c80c

  • SHA1

    644eef3bb78b0e340b2f4977dc0c17b26889603b

  • SHA256

    e3ac84aeb4c0a6606a5e385327f371c36335954f27ec4151d616fbb73d466e37

  • SHA512

    4d573618672bd491916753363403dd401db21a287aa3f35c7264478bf237b3aed9e14f1da868709d10e034fa30222f3e47b6acd796df6aad08be31652a023e1f

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe
    "C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\is-4KGVV.tmp\e00743a06378fdc48df81c57ff27c80c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4KGVV.tmp\e00743a06378fdc48df81c57ff27c80c.tmp" /SL5="$5015C,570602,58368,C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-4KGVV.tmp\e00743a06378fdc48df81c57ff27c80c.tmp

    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • \Users\Admin\AppData\Local\Temp\is-4KGVV.tmp\e00743a06378fdc48df81c57ff27c80c.tmp

    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • memory/1436-4-0x0000000000000000-mapping.dmp

  • memory/1436-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1888-2-0x0000000075781000-0x0000000075783000-memory.dmp

    Filesize

    8KB

  • memory/1888-7-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB