Analysis

  • max time kernel
    25s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 04:00

General

  • Target

    9d5395d9c095c1aeae0901861b6949c738704cc408ee2d09c3ab08bd82754bb2.exe

  • Size

    479KB

  • MD5

    69f43d5ad7967296d2798fe101940870

  • SHA1

    cdf753e090e424c0ae1be096f1d48220f7c2fbad

  • SHA256

    9d5395d9c095c1aeae0901861b6949c738704cc408ee2d09c3ab08bd82754bb2

  • SHA512

    53b9acacdfe53073f8ee0ad6a5dae6c738ee48e00b07dfcff42d0f56811dfa81e60850dc01a7a1cdced7d5cdbecbea998569c9914c9ef38bdb2ba29751011505

  • SSDEEP

    12288:Vu06aQoqE+sbkDE5nmNgY4hEMqNtUxukd9UgeF:VxdQoEsAYmN46Muuxuk8geF

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d5395d9c095c1aeae0901861b6949c738704cc408ee2d09c3ab08bd82754bb2.exe
    "C:\Users\Admin\AppData\Local\Temp\9d5395d9c095c1aeae0901861b6949c738704cc408ee2d09c3ab08bd82754bb2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe
      2⤵
      • Executes dropped EXE
      PID:1616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe
      2⤵
      • Executes dropped EXE
      PID:1716

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ÖÕ½áÃâɱ.exe

          Filesize

          419KB

          MD5

          1a5a5f057ca2f943475d60724128f06e

          SHA1

          8cef57435be1b1fdf52dacfb33ce252b3eabfd48

          SHA256

          c0cdeda726ea1bacb9a0924fba21e372975f0327fd85a3d6845c48c56ac4d20b

          SHA512

          c8354b3585ad33bbcc78ef020e3ea7f2f49277b868b276d6df2ce1a9ef2c30128de63640f8e1238fb477ff92652b13f19dfa86357441f98d961a9c2f441c1a08

        • memory/1948-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

          Filesize

          8KB