Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 14:27

General

  • Target

    06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.exe

  • Size

    6.1MB

  • MD5

    cb1f284e1663b853c693554063e04b1d

  • SHA1

    b8def96ab1e533c6f252dbfa48d84440ad1fd309

  • SHA256

    06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545

  • SHA512

    378eff9915784cc2d7f1158a0e7b370731564c29e1cb9443707394b3846ddf75726f99491716a4009f2c49b95ffd62f26c5ee1b241c2f41153d5f1a16c4ab4b4

  • SSDEEP

    98304:gre/braW2XQdt+oPjd5Pm1MNTMwdwpcVqZEa5iVHH+WxsgSbTGuKEiUk5+PXAprj:grE8XkTTpOpcVqZDWSbTHiBMPXS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.exe
    "C:\Users\Admin\AppData\Local\Temp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\is-3PFVR.tmp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3PFVR.tmp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.tmp" /SL5="$80022,5948045,312320,C:\Users\Admin\AppData\Local\Temp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-3PFVR.tmp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.tmp

    Filesize

    1.3MB

    MD5

    3bededae77bec41319ee5ff089c79d3e

    SHA1

    8fc085de4c1b814d6768544924b2f40214d278e2

    SHA256

    10f8c521a009aa9710b52bf79a1c14a79af360fa4c86814e09f4bfd02da9022c

    SHA512

    0000e268bdcd4a7528f4ac8a067dea7870b690ba271e9c614456cf60ab13ef06d4cb7528a573810715252eef815dac5aef63a5bde6f7152956a067373454a7ce

  • \Users\Admin\AppData\Local\Temp\is-3PFVR.tmp\06218c9e37f604fa86e345a601182f1a1507b5e7fa36374f93414ea893a64545.tmp

    Filesize

    1.3MB

    MD5

    3bededae77bec41319ee5ff089c79d3e

    SHA1

    8fc085de4c1b814d6768544924b2f40214d278e2

    SHA256

    10f8c521a009aa9710b52bf79a1c14a79af360fa4c86814e09f4bfd02da9022c

    SHA512

    0000e268bdcd4a7528f4ac8a067dea7870b690ba271e9c614456cf60ab13ef06d4cb7528a573810715252eef815dac5aef63a5bde6f7152956a067373454a7ce

  • \Users\Admin\AppData\Local\Temp\is-B1N0G.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-B1N0G.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1284-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1284-55-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/1284-61-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB