Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2022, 21:55

General

  • Target

    28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe

  • Size

    124KB

  • MD5

    962cfa90c907494628e4ac54a2e548b4

  • SHA1

    537a8d57190fb2ef0e8924f82e15529768b95387

  • SHA256

    28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

  • SHA512

    a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

  • SSDEEP

    1536:oxojIjwCJXwDEi5r2wjs6tkVjHBYXGKoW:oxosjw8wHLj5AwGKoW

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe
    "C:\Users\Admin\AppData\Local\Temp\28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\Documents\AppData\exp.exe
      "C:\Users\Admin\Documents\AppData\exp.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Users\Admin\Documents\AppData\exp.exe
        C:\Users\Admin\Documents\AppData\exp.exe -addcopy
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1308
      • C:\Users\Admin\Documents\AppData\exp.exe
        C:\Users\Admin\Documents\AppData\exp.exe -addcopy
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1116

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\cfid

          Filesize

          32B

          MD5

          9be207ac5b46d59f78407f67a62aaa79

          SHA1

          01fd0f97664779805af0cfb053fbeb3d6d3fbcb3

          SHA256

          1527709a236e4a196194a53678163a1b59687af8aef8470ff22ab6e3e279fb65

          SHA512

          58468cfa552944a59d3b6a137a6fcc4e07d5f977f6769b688a6c15cfbf9abd6e1bf0eee51afccbdcd5a0b4070e387852affb3e4c33aca3f9beba5611f681c589

        • C:\Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • C:\Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • C:\Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • C:\Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • \Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • \Users\Admin\Documents\AppData\exp.exe

          Filesize

          124KB

          MD5

          962cfa90c907494628e4ac54a2e548b4

          SHA1

          537a8d57190fb2ef0e8924f82e15529768b95387

          SHA256

          28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51

          SHA512

          a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e

        • memory/956-62-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/956-70-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1116-74-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1116-76-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1308-68-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1308-71-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1812-56-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1812-54-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1812-60-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1812-55-0x0000000076091000-0x0000000076093000-memory.dmp

          Filesize

          8KB