Analysis

  • max time kernel
    118s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    21-04-2021 18:03

General

  • Target

    2942374610000000.exe

  • Size

    5.0MB

  • MD5

    59498885737e7cb3114a58df9d6ba36a

  • SHA1

    a826024a0cde1262dd37e6ee7542fabc12d3e8e7

  • SHA256

    f98c7b0c2c4618d63c38d0c9f7bdc1085e4008296568ee5519ad44e7a3145080

  • SHA512

    67603e79638e085239d4d8a012d202f89678510779fe23e05f3b3341a04b5d5184daf781f3bb8f693ec83980f3d5cc6158fa2c81c5f5f09c1be288e5db100126

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe
    "C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp" /SL5="$3015C,4505583,807936,C:\Users\Admin\AppData\Local\Temp\2942374610000000.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe
        "C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\MSVCP140.dll
    MD5

    d25c3ff7a4cbbffc7c9fff4f659051ce

    SHA1

    02fe8d84d7f74c2721ff47d72a6916028c8f2e8a

    SHA256

    9c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5

    SHA512

    945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065

  • C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe
    MD5

    52ffaba4273678bae75442f2bc85b470

    SHA1

    66a4c6cf92a4190a1480fd2b19ac84952fa715bd

    SHA256

    70225f14a28007815b0410b1f41f7ea6a16b6329fd69f7ec06386b05862cf5c4

    SHA512

    4d6e222378cc99b7ca64ec6738b97504201364760e94ba0276f272860608952e5a260b70a28246d6857404209c7b2ecefd0c22eba59b3788069da7a1b39266f2

  • C:\Users\Admin\AppData\Local\Temp\is-15PDN.tmp\mozglue.dll
    MD5

    e2f7b050c6c83505611807e81db58e16

    SHA1

    a06a6fd60486e8b27e926f30b7d20fc7b2354eed

    SHA256

    9019976df7d3423dcceff61397360bb300f693a1bf98e5bfd33ad3fbeadd24d8

    SHA512

    efb432a1389136a9f87b8834b9c78c1baf953b84d338621e4841376d03b0a31d1f92186786c3cd8fb390a25a2ed77a2c0f1e3c49f73c57994ef684e552969407

  • C:\Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp
    MD5

    5e3c59bf3ee2f8e57bb87a221e30fc5a

    SHA1

    b65cd2b8d084e3baa52fae043bde264003dd368c

    SHA256

    e0e5993c5c9c4675593d9329f620a29e111b27755b5a299af8798cf9fbead7ac

    SHA512

    ffa7fd96881726f5f2c77d6d7fe1f819d6725b545f55386b12049da0f929435e32f1ac5eb331ff726ecfaf90dbdfb0db1e1c6b2a8d606ba5341bcb6263acf4b2

  • \Users\Admin\AppData\Local\Temp\is-15PDN.tmp\firefox.exe
    MD5

    52ffaba4273678bae75442f2bc85b470

    SHA1

    66a4c6cf92a4190a1480fd2b19ac84952fa715bd

    SHA256

    70225f14a28007815b0410b1f41f7ea6a16b6329fd69f7ec06386b05862cf5c4

    SHA512

    4d6e222378cc99b7ca64ec6738b97504201364760e94ba0276f272860608952e5a260b70a28246d6857404209c7b2ecefd0c22eba59b3788069da7a1b39266f2

  • \Users\Admin\AppData\Local\Temp\is-15PDN.tmp\mozglue.dll
    MD5

    e2f7b050c6c83505611807e81db58e16

    SHA1

    a06a6fd60486e8b27e926f30b7d20fc7b2354eed

    SHA256

    9019976df7d3423dcceff61397360bb300f693a1bf98e5bfd33ad3fbeadd24d8

    SHA512

    efb432a1389136a9f87b8834b9c78c1baf953b84d338621e4841376d03b0a31d1f92186786c3cd8fb390a25a2ed77a2c0f1e3c49f73c57994ef684e552969407

  • \Users\Admin\AppData\Local\Temp\is-15PDN.tmp\msvcp140.dll
    MD5

    d25c3ff7a4cbbffc7c9fff4f659051ce

    SHA1

    02fe8d84d7f74c2721ff47d72a6916028c8f2e8a

    SHA256

    9c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5

    SHA512

    945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065

  • \Users\Admin\AppData\Local\Temp\is-EH2E1.tmp\2942374610000000.tmp
    MD5

    5e3c59bf3ee2f8e57bb87a221e30fc5a

    SHA1

    b65cd2b8d084e3baa52fae043bde264003dd368c

    SHA256

    e0e5993c5c9c4675593d9329f620a29e111b27755b5a299af8798cf9fbead7ac

    SHA512

    ffa7fd96881726f5f2c77d6d7fe1f819d6725b545f55386b12049da0f929435e32f1ac5eb331ff726ecfaf90dbdfb0db1e1c6b2a8d606ba5341bcb6263acf4b2

  • memory/540-60-0x0000000000400000-0x00000000004D3000-memory.dmp
    Filesize

    844KB

  • memory/540-59-0x0000000075A71000-0x0000000075A73000-memory.dmp
    Filesize

    8KB

  • memory/1352-69-0x0000000000000000-mapping.dmp
  • memory/2016-62-0x0000000000000000-mapping.dmp
  • memory/2016-67-0x0000000074601000-0x0000000074603000-memory.dmp
    Filesize

    8KB

  • memory/2016-66-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB