Analysis

  • max time kernel
    36s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 03:49

General

  • Target

    a257cca760d6e8f70050339dd2f5197bfbc0e503b036478689a47ffd96e614f6.exe

  • Size

    486KB

  • MD5

    6925908e26a1f8ed4e4f26e55c275270

  • SHA1

    6cc3ee84f0c83bba947f23077bd301e8ba861296

  • SHA256

    a257cca760d6e8f70050339dd2f5197bfbc0e503b036478689a47ffd96e614f6

  • SHA512

    7dab1bf76107c259d092151d9af64964db2755bedff98f34d8db13a7229025e63753c61c5409cf47c38cc65e6a78830d2201dd4d3d55bfd689afb8e709e7ffc0

  • SSDEEP

    12288:o5IMrLm6UGAvnY+Ycc2tYPEFPakDxtIxmXp8xkB:o5i6anXFc2tYPEFRDBB

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a257cca760d6e8f70050339dd2f5197bfbc0e503b036478689a47ffd96e614f6.exe
    "C:\Users\Admin\AppData\Local\Temp\a257cca760d6e8f70050339dd2f5197bfbc0e503b036478689a47ffd96e614f6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\bpuninstall.exe
      "C:\Users\Admin\AppData\Local\Temp\bpuninstall.exe" /child
      2⤵
      • Executes dropped EXE
      PID:1556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BrowserPlusUninstaller.log

    Filesize

    246B

    MD5

    e63f489f8e3995272b85b179bb7ccdc9

    SHA1

    f575d77a4ac41f030786934e0f790e0cebf7f6f0

    SHA256

    b5a265ee474045b22928ccd45a08feeaa077da7b21e1e645879b006bc2e2cb21

    SHA512

    3780a281720ab13c906599c610004abb015c21c1bcf2d1e9db4a3176507e50b4936a62af49b0c1bd337794bf453cf5cad1c2feeda1456e01bafedf6a1f33d483

  • C:\Users\Admin\AppData\Local\Temp\bpuninstall.exe

    Filesize

    486KB

    MD5

    6925908e26a1f8ed4e4f26e55c275270

    SHA1

    6cc3ee84f0c83bba947f23077bd301e8ba861296

    SHA256

    a257cca760d6e8f70050339dd2f5197bfbc0e503b036478689a47ffd96e614f6

    SHA512

    7dab1bf76107c259d092151d9af64964db2755bedff98f34d8db13a7229025e63753c61c5409cf47c38cc65e6a78830d2201dd4d3d55bfd689afb8e709e7ffc0

  • memory/1348-54-0x0000000074F41000-0x0000000074F43000-memory.dmp

    Filesize

    8KB

  • memory/1348-59-0x0000000001000000-0x000000000107F000-memory.dmp

    Filesize

    508KB

  • memory/1348-60-0x00000000000A0000-0x00000000000AF000-memory.dmp

    Filesize

    60KB

  • memory/1348-61-0x00000000000B0000-0x00000000000BE000-memory.dmp

    Filesize

    56KB

  • memory/1348-64-0x0000000001000000-0x000000000107F000-memory.dmp

    Filesize

    508KB

  • memory/1556-55-0x0000000000000000-mapping.dmp

  • memory/1556-63-0x0000000000110000-0x000000000011F000-memory.dmp

    Filesize

    60KB

  • memory/1556-62-0x0000000000140000-0x00000000001BF000-memory.dmp

    Filesize

    508KB

  • memory/1556-65-0x0000000000120000-0x000000000012E000-memory.dmp

    Filesize

    56KB

  • memory/1556-66-0x0000000000140000-0x00000000001BF000-memory.dmp

    Filesize

    508KB