Analysis

  • max time kernel
    98s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2022 22:14

General

  • Target

    df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe

  • Size

    252KB

  • MD5

    6194370c4f0d30f4b4a617aaeb03e066

  • SHA1

    9021444550b07341d35ecfaa6cc87e346ea986cf

  • SHA256

    df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9

  • SHA512

    f0939168c4629e61ad74d4e8c1698d863ab888d15c7a5e725c2fa8eda7b6d8c0b30ad442f0fc35a20d70c42bd23ca03de4130016b603abf4f88196260867b9fd

  • SSDEEP

    6144:9FS4H7t3Pzj/WDeqWJ2SibWmNjOYcDw8gYtDd83Ejfi2HTNcu:9BpPv1dQFSV4K+3CHRH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe
    "C:\Users\Admin\AppData\Local\Temp\df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    74KB

    MD5

    eef3574b100e2621bb398716b56bb383

    SHA1

    21f74faaa9b0d4086c976af384c3c0729cd6f1e0

    SHA256

    3340f2499b0a75b565e170c312694be7fe56e702ece087def05c7c333e8d3dd1

    SHA512

    34d53669e4bb0a39e88d0351890a801be0d095dc9b22e542685921d0c4f5a562c18f1c078ed69175343e6286bb010c14a34f6dacd9109b3e50b786b9783ecccc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe

    Filesize

    74KB

    MD5

    eef3574b100e2621bb398716b56bb383

    SHA1

    21f74faaa9b0d4086c976af384c3c0729cd6f1e0

    SHA256

    3340f2499b0a75b565e170c312694be7fe56e702ece087def05c7c333e8d3dd1

    SHA512

    34d53669e4bb0a39e88d0351890a801be0d095dc9b22e542685921d0c4f5a562c18f1c078ed69175343e6286bb010c14a34f6dacd9109b3e50b786b9783ecccc

  • C:\Windows\SysWOW64\wmimgr32.dll

    Filesize

    23KB

    MD5

    9ebb3e4fc0c32524ba4098e214a06150

    SHA1

    41d0964a70edc0875ff9a8091b6911e18684e1ed

    SHA256

    f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d

    SHA512

    d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a

  • C:\Windows\SysWOW64\wmimgr32.dll

    Filesize

    23KB

    MD5

    9ebb3e4fc0c32524ba4098e214a06150

    SHA1

    41d0964a70edc0875ff9a8091b6911e18684e1ed

    SHA256

    f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d

    SHA512

    d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a

  • C:\Windows\SysWOW64\wmimgr32.dll

    Filesize

    23KB

    MD5

    9ebb3e4fc0c32524ba4098e214a06150

    SHA1

    41d0964a70edc0875ff9a8091b6911e18684e1ed

    SHA256

    f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d

    SHA512

    d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a

  • memory/3164-142-0x0000000044440000-0x000000004445C000-memory.dmp

    Filesize

    112KB

  • memory/3164-145-0x0000000044440000-0x000000004445C000-memory.dmp

    Filesize

    112KB

  • memory/4336-132-0x0000000001000000-0x000000000103F000-memory.dmp

    Filesize

    252KB

  • memory/4336-136-0x0000000000550000-0x0000000000589000-memory.dmp

    Filesize

    228KB

  • memory/4336-135-0x0000000000500000-0x0000000000504000-memory.dmp

    Filesize

    16KB

  • memory/4336-134-0x0000000001000000-0x000000000103F000-memory.dmp

    Filesize

    252KB

  • memory/4336-143-0x0000000001000000-0x000000000103F000-memory.dmp

    Filesize

    252KB

  • memory/4336-144-0x0000000000550000-0x0000000000589000-memory.dmp

    Filesize

    228KB

  • memory/4336-146-0x0000000001000000-0x000000000103F000-memory.dmp

    Filesize

    252KB