Analysis

  • max time kernel
    38s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2022 03:16

General

  • Target

    d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.exe

  • Size

    5.0MB

  • MD5

    0ab37e4b15e51f31094b8eaa86894574

  • SHA1

    99a1b3e1a46539fe3b5fd9b20e5d53af4e110000

  • SHA256

    d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8

  • SHA512

    88a1fd6141a75abc5587c971845c562712e991902bc678f0c4db351ac4d5d6fa4f552c965b2723646d2a308f78ef12ae50db94f4457cb98972bc93c5a1f8dfda

  • SSDEEP

    98304:vNE1elRN9fN5JY+qDlqvLW18yEBmCYNyVXZM0:vNcelRP7+zheW1b5CYNcXu0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.exe
    "C:\Users\Admin\AppData\Local\Temp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Users\Admin\AppData\Local\Temp\is-PPJGH.tmp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PPJGH.tmp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.tmp" /SL5="$60124,4713736,217600,C:\Users\Admin\AppData\Local\Temp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-PPJGH.tmp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.tmp

    Filesize

    20KB

    MD5

    bd7d7a0d284edec0ae68b05b3ab48a80

    SHA1

    84f394cbdcfcc129c7791e35b032ba901ddf5df8

    SHA256

    4f944fe7193b88e85f80f729e9f3b0574237e3469f4c9bb8a23a2f87e1dce950

    SHA512

    8ba56c628ea4521a7fd1601f1bf02b912b40383a58fc8f8d629d3c620451f93818bffcd8de351469fb8e2b8f509e7b5091e774849aea4b8e9c14e4a4744f5224

  • \Users\Admin\AppData\Local\Temp\is-3MJK0.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-3MJK0.tmp\_isetup\_shfoldr.dll

    Filesize

    19KB

    MD5

    dd76cef30334bc02bfbbbca5e32bf823

    SHA1

    c8e68d711d8d10cde20c7adb7e90ee483a93f1c7

    SHA256

    d7201bd2a32b7645a7ad3f861c1d3ef75d602d02479ff9394ff81cb1f8f18627

    SHA512

    c75f4f538981e2ca2d128f2c768c0ebb1ff494104e34190186ec85133666e8f1f023d3307186b3eeddfd886f320c93ce4fcb217485eaa46026744534c4d7889e

  • \Users\Admin\AppData\Local\Temp\is-3MJK0.tmp\supereasy_inet2.dll

    Filesize

    11KB

    MD5

    d499121406f7ff7d20a514bd5e7af325

    SHA1

    2083a94e087da40d07c769db59156b4581a79b83

    SHA256

    1409f249a573de19fd7463cd410668fa8644225a360b5d7bb9f3f6670ccb55eb

    SHA512

    4d88e4056a5cc2437027a637ec340e1f2c8be01df557511f8b58c34d7441c1a1c5a9b4cf3ca54ff66c495e49fde608986db9e9da1c76f0b5f6b9bbf0eb957e93

  • \Users\Admin\AppData\Local\Temp\is-PPJGH.tmp\d88c893efcf621bb585a2daa0b053277bf7266a99e16d8fd5932b2cfb8987db8.tmp

    Filesize

    16KB

    MD5

    dc1b2afbfecad59c11141c649eb51343

    SHA1

    b357a4fc5d06000b1fd89a50f8918cf87ad0d85b

    SHA256

    403b0d463d427d3deb3f9b317e665ed2c6e6e35318ceaaa2a9c3fb8183438923

    SHA512

    c909601dd759d8e10bbfc070987913546965c40673a2afefc5d1adb6396c2e61d8f85d7b91a04f358588feb0b5af2bb80cb0dbca23b3200eb335a775bc04b450

  • memory/1572-54-0x0000000076121000-0x0000000076123000-memory.dmp

    Filesize

    8KB

  • memory/1572-55-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1572-61-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1920-58-0x0000000000000000-mapping.dmp