Analysis

  • max time kernel
    3s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 21:56

General

  • Target

    d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe

  • Size

    26KB

  • MD5

    1628254a2a0e1ad9160f0f263e51d7d2

  • SHA1

    123a768be7656a2673c90fe58e3a04e8836e6304

  • SHA256

    d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

  • SHA512

    f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

  • SSDEEP

    384:DZyrOAVI7cfceEAQ1uLsH7tns5NxTwnstZ0rlDPBdrhMIQ0crqBCDS5oqGAEjpeV:DZJAGc3EdQC5nST9ihBMfryC25oIOZS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe
    "C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\SysWOW64\NTdhcp.exe
      C:\Windows\system32\NTdhcp.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:1112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\Deleteme.bat
      2⤵
      • Deletes itself
      PID:2016

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Deleteme.bat

          Filesize

          248B

          MD5

          ab65f0325b59c2e2ceb5e8e23334b049

          SHA1

          b13e360c7786ba00083a33f5e0c3acdffff84b43

          SHA256

          ff02e03f62d627c463c59f376a19bb849994c674609e2f54481aef2ce61d9c1d

          SHA512

          0fbd5a577ebb6840bd4abbf8c59728226bfd4a397752f227e4646ceed61ac80038db72af95589b07a0d5700c724b58ff736955110d807394cb0843897cef6252

        • C:\Windows\SysWOW64\NTdhcp.exe

          Filesize

          26KB

          MD5

          1628254a2a0e1ad9160f0f263e51d7d2

          SHA1

          123a768be7656a2673c90fe58e3a04e8836e6304

          SHA256

          d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

          SHA512

          f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

        • C:\Windows\SysWOW64\NTdhcp.exe

          Filesize

          26KB

          MD5

          1628254a2a0e1ad9160f0f263e51d7d2

          SHA1

          123a768be7656a2673c90fe58e3a04e8836e6304

          SHA256

          d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

          SHA512

          f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

        • \Windows\SysWOW64\NTdhcp.exe

          Filesize

          26KB

          MD5

          1628254a2a0e1ad9160f0f263e51d7d2

          SHA1

          123a768be7656a2673c90fe58e3a04e8836e6304

          SHA256

          d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

          SHA512

          f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

        • \Windows\SysWOW64\NTdhcp.exe

          Filesize

          26KB

          MD5

          1628254a2a0e1ad9160f0f263e51d7d2

          SHA1

          123a768be7656a2673c90fe58e3a04e8836e6304

          SHA256

          d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4

          SHA512

          f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c

        • memory/688-61-0x0000000000400000-0x0000000000416200-memory.dmp

          Filesize

          88KB

        • memory/1112-59-0x0000000000400000-0x0000000000416200-memory.dmp

          Filesize

          88KB