Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 16:00

General

  • Target

    3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe

  • Size

    1.9MB

  • MD5

    c18eedf717d2241791d0d6d198108c3a

  • SHA1

    11cca93f01133aac7ad9d0d8b0d11d600738681d

  • SHA256

    3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7

  • SHA512

    73e166ce56d03c4d80af33ea516690d7e6020c75a43cf742f9d8cf3e5ebae392b2b8924fc80de888fffc54bfef3a31c104ccca16510aadc21334ad2138ce2713

  • SSDEEP

    24576:t7FUDowAyrTVE3U5FmMtjqHMQs3JIwaVzE5x7awFhJdNo69lOy7KTijlz:tBuZrEUWsb3ipE55DdN7POGjh

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe
    "C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp" /SL5="$70124,1123903,832512,C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp

    Filesize

    3.0MB

    MD5

    6b4b3a771b70a471d8b0cd318b9298e9

    SHA1

    47eb8bf55d56ee221e56c00b8fdfc1a6ddc95f6f

    SHA256

    c23aa1780d81d16cfa9caaf60cf0b12a2b0772f3c9ced5c22b415eb62ee232fa

    SHA512

    f8c327c3f0b9c6351b7e22627053f493f728c96a15f6d50d9597913e21c03a4a937312dca6b06a24b909deb92e3f9986997628db84b825d6c940deeab8f58d5c

  • \Users\Admin\AppData\Local\Temp\is-6ML70.tmp\helper.dll

    Filesize

    419KB

    MD5

    7acd12c152179c868c825aada166e40a

    SHA1

    6e3f2392b9296c79698434dadf6cfd5395aa8ba7

    SHA256

    34f43b1fd5bf852de7071540eb0768fce1d7e45a90d3ac18d2ebe99aacb1a940

    SHA512

    03b592c1f4f1d5175680e9ed4ddc8cf5bd53a56fad33d887425a95c9fb3670c7d075df59903e7d1ca5686a60a7acb3b7237c8fc815105b853e62bdca367dec2c

  • \Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp

    Filesize

    3.0MB

    MD5

    6b4b3a771b70a471d8b0cd318b9298e9

    SHA1

    47eb8bf55d56ee221e56c00b8fdfc1a6ddc95f6f

    SHA256

    c23aa1780d81d16cfa9caaf60cf0b12a2b0772f3c9ced5c22b415eb62ee232fa

    SHA512

    f8c327c3f0b9c6351b7e22627053f493f728c96a15f6d50d9597913e21c03a4a937312dca6b06a24b909deb92e3f9986997628db84b825d6c940deeab8f58d5c

  • memory/1624-58-0x0000000000000000-mapping.dmp

  • memory/1672-54-0x0000000075111000-0x0000000075113000-memory.dmp

    Filesize

    8KB

  • memory/1672-55-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1672-62-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1672-63-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB