Analysis

  • max time kernel
    37s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2022 05:06

General

  • Target

    d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe

  • Size

    326KB

  • MD5

    6faf9f0f2dab4a542c515ce71c45ee90

  • SHA1

    99c3a4e66272015eeb3fbfab6c118693361bb095

  • SHA256

    d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c

  • SHA512

    c4b78ee8c2c971661c525ffb3bee0fe5738eb67325bcc685076a2c0b500faffd0bfa55633661a13ef4c7a8689f20e1c92a6ea217d08b302d2f3a66fd7fd1a5cb

  • SSDEEP

    6144:NyH7xOc6H5c6HcT66vlmf9BS+CromJn8AppuiexjZZ+ucETlI8wE+AQ4IObemeRv:NaiBpCromJn8mu75P+FETlI8p1ORccXB

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe
    "C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe
        "C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe
          "C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe" f=C:\Users\Admin\AppData\Local\Temp
          4⤵
          • Executes dropped EXE
          PID:1744
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • C:\Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • C:\Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    9e3c13b6556d5636b745d3e466d47467

    SHA1

    2ac1c19e268c49bc508f83fe3d20f495deb3e538

    SHA256

    20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

    SHA512

    5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

  • \Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • \Users\Admin\AppData\Local\Temp\A~NSISu_.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • \Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • \Users\Admin\AppData\Local\Temp\d16abc58e0bd636587b5f9d8a2b9f7742c7d6465522de1f07f67766ac8fadc6c.exe

    Filesize

    290KB

    MD5

    d26ac46b98f6629f5a5db8331c5fdc9b

    SHA1

    2f16d985f42dffb65121df2df6d206e4407026ef

    SHA256

    09910a7361b8a0473f308a4d5f50aaa771f81683ad51310819f5776f49859634

    SHA512

    768f968dcded0931a1369427cff99067f474a97443d10abc22f7a9897179064c61108c1505bfecc83a9c7ab7156202855899f207d11b4ecbfd112ce6a51ac06d

  • memory/1000-61-0x0000000076321000-0x0000000076323000-memory.dmp

    Filesize

    8KB