Analysis

  • max time kernel
    39s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/10/2022, 23:24

General

  • Target

    2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe

  • Size

    135KB

  • MD5

    0b0f3c19368146c8c6d4afca5d8f1310

  • SHA1

    01448b0c583e0bf660d96c801b8b48fd994978c4

  • SHA256

    2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131

  • SHA512

    07459dc96b8234cedf253f120e39df4e2f781179b71f5cf31ba8ebe70c98f71e66a49ba1f15bfc386f3e916b8e102043761d3743e6a3f11ee114b8c12972674e

  • SSDEEP

    3072:jO7ADbDlkSO9GnRrda5rHitOuI7QR1OhIgdHcjCNout:K7AD/lkDGnRr8xCMQGqKmgoS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe
    "C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\msprxysvc32.exe
      C:\Windows\system32\msprxysvc32.exe 516 "C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\msprxysvc32.exe
        3⤵
          PID:1228

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\msprxysvc32.exe

            Filesize

            135KB

            MD5

            0b0f3c19368146c8c6d4afca5d8f1310

            SHA1

            01448b0c583e0bf660d96c801b8b48fd994978c4

            SHA256

            2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131

            SHA512

            07459dc96b8234cedf253f120e39df4e2f781179b71f5cf31ba8ebe70c98f71e66a49ba1f15bfc386f3e916b8e102043761d3743e6a3f11ee114b8c12972674e

          • C:\Windows\SysWOW64\msprxysvc32.exe

            Filesize

            92KB

            MD5

            65b486a78b8598d1d14c250ff20773da

            SHA1

            37e5fac69d25cf92b61aba9d7b6fafd5817fa076

            SHA256

            e41fec3a255f146a69c68b7d294c3e88aaccaabf61881e164c6de0e74a6ec4ec

            SHA512

            a962876f671055576743702b899f00644bbd38702a6920821774c4bdc9445b93460825c269cf8f506b53ad215bf2773814d82d130644a9667704c094890891cb

          • \Windows\SysWOW64\msprxysvc32.exe

            Filesize

            88KB

            MD5

            891b4dd32cbe244fd83b74353ecbe2f3

            SHA1

            4008e1bbdedfe31a9bf300e9d19eeebafe84cffb

            SHA256

            67b3d12a98171cd455eadac81f65a635106657c4b204db6e316528b63d9f77f6

            SHA512

            7ca0c25421a1d15d5064d47cadd0ca9bcd82e656c71382b777a101ec17b2c4419b9b3c50c5727a027c4da9221fa7a04d1ec61997255157eec5ad88630e67608e

          • \Windows\SysWOW64\msprxysvc32.exe

            Filesize

            71KB

            MD5

            66842bbf3dcb3351fd7c1d525d3c79a6

            SHA1

            c3f17f423c947c8ff9c3f32f1ca9767ea2f90146

            SHA256

            7bfa59d1d46c8f911a8664e5ff5ef16156a425ce3807ddeea3dc2c6017c0f898

            SHA512

            db172737d8678122c3df2b1652e21decc5aeeac982f4cce44a4ff0d638a0e5bb846628be58fd0425713ed20981e54ea3087d67894c890386475fcc566079f27a

          • memory/1112-55-0x0000000000400000-0x000000000049F000-memory.dmp

            Filesize

            636KB

          • memory/1112-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

            Filesize

            8KB

          • memory/1112-61-0x00000000027D0000-0x000000000286F000-memory.dmp

            Filesize

            636KB

          • memory/1112-63-0x0000000000400000-0x000000000049F000-memory.dmp

            Filesize

            636KB

          • memory/1712-62-0x0000000000400000-0x000000000049F000-memory.dmp

            Filesize

            636KB

          • memory/1712-66-0x0000000000400000-0x000000000049F000-memory.dmp

            Filesize

            636KB