Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2022, 05:16

General

  • Target

    ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe

  • Size

    15.2MB

  • MD5

    c6305a70a7507d580df16a25cc6d0933

  • SHA1

    7f91267ad3ecf684d36a1d9a25287804e28cfac9

  • SHA256

    ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936

  • SHA512

    4d8160cdeeedf26fa1a900e39abf4286c30725a63b20074f27c469b0a518e0dd4e5a751dcf95f5afff150b78e29a41bc9009c2e56749fb0d5a5a659fbe11bb87

  • SSDEEP

    393216:UM6grn9+BjqoffR71aTtMQ7SyCRjwxxuD:URffR5Qp7rCRjCuD

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe
    "C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp" /SL5="$80022,15638478,58368,C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe"
      2⤵
      • Executes dropped EXE
      PID:1080

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp

          Filesize

          706KB

          MD5

          ee588c43b0ed7b2d0fd91488a594a0da

          SHA1

          db349399e16e13a936f1ab40c4fce3520594b98f

          SHA256

          fbe9685a3ec433a184d139ce98369d8eb7ede0f88ed8ba0e0fdb96330b76a0b5

          SHA512

          42b988e05209b07c182a82d7a98ba877e89195d50ec649f20d24090b490d08a2c922149c193826f862b370fbe75c6e66b2fe1d34414edf9105e3a7f7a1b281dc

        • \Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp

          Filesize

          706KB

          MD5

          ee588c43b0ed7b2d0fd91488a594a0da

          SHA1

          db349399e16e13a936f1ab40c4fce3520594b98f

          SHA256

          fbe9685a3ec433a184d139ce98369d8eb7ede0f88ed8ba0e0fdb96330b76a0b5

          SHA512

          42b988e05209b07c182a82d7a98ba877e89195d50ec649f20d24090b490d08a2c922149c193826f862b370fbe75c6e66b2fe1d34414edf9105e3a7f7a1b281dc

        • memory/1292-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

          Filesize

          8KB

        • memory/1292-55-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1292-61-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB