Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 13:49

General

  • Target

    0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe

  • Size

    524KB

  • MD5

    38826150a7796f58566485054d3ee9ca

  • SHA1

    4dee1e79d7672a1c054d89c45a5258a4396c1a7d

  • SHA256

    0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc

  • SHA512

    1424fde9c4f7dd1edf84b8f15dbaac6e7e1398c34e0c6b556293716984cb60430e705f993b69175e4f86efffde5af79608e960b04344870edb32bf21441c2c11

  • SSDEEP

    12288:bnvjnEl2QTrzf5MRzWujYmIK/mqulRqmpY/6jphV97nvjH:362Q3ziWwYdR351Hj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe
    "C:\Users\Admin\AppData\Local\Temp\0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\~DFA4F.tmp
      C:\Users\Admin\AppData\Local\Temp\~DFA4F.tmp OK
      2⤵
      • Executes dropped EXE
      PID:984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~DFA4F.tmp

    Filesize

    533KB

    MD5

    6a7036a3c0b3eee2c92ba09ad24b2f4b

    SHA1

    c8306ccc3dcb80635793a8a8e136d22de86c9599

    SHA256

    fcda67aa601a536fb97b1eb26258e2361adabcc56e183aade10c86fb9d498c4f

    SHA512

    c9fff0b00a4629d1b497be2313fb79cb4ffd71edccb23c7a863925332da86292e581f6eb4890182a4d07489cd47bf364bc3e626b0f524c766e1f3aaf233f3b00

  • \Users\Admin\AppData\Local\Temp\~DFA4F.tmp

    Filesize

    533KB

    MD5

    6a7036a3c0b3eee2c92ba09ad24b2f4b

    SHA1

    c8306ccc3dcb80635793a8a8e136d22de86c9599

    SHA256

    fcda67aa601a536fb97b1eb26258e2361adabcc56e183aade10c86fb9d498c4f

    SHA512

    c9fff0b00a4629d1b497be2313fb79cb4ffd71edccb23c7a863925332da86292e581f6eb4890182a4d07489cd47bf364bc3e626b0f524c766e1f3aaf233f3b00

  • memory/984-56-0x0000000000000000-mapping.dmp

  • memory/984-61-0x0000000000920000-0x00000000009C3000-memory.dmp

    Filesize

    652KB

  • memory/984-63-0x0000000000920000-0x00000000009C3000-memory.dmp

    Filesize

    652KB

  • memory/1048-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB

  • memory/1048-59-0x0000000000A70000-0x0000000000B13000-memory.dmp

    Filesize

    652KB

  • memory/1048-60-0x0000000002DB0000-0x0000000002E53000-memory.dmp

    Filesize

    652KB

  • memory/1048-62-0x0000000000A70000-0x0000000000B13000-memory.dmp

    Filesize

    652KB