Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 19:22

General

  • Target

    f83f81d50f3f37b053e7dea8a988f6e0f7b44f2ee8696ee727b4d5bd4f64d134.exe

  • Size

    316KB

  • MD5

    842e38ccb449b067d54c5eb5d391a8b0

  • SHA1

    b179f34ddfcbf946b9d49a3e33903c1be0327408

  • SHA256

    f83f81d50f3f37b053e7dea8a988f6e0f7b44f2ee8696ee727b4d5bd4f64d134

  • SHA512

    d8fee7c617f1d425ffd7df8a73896ce5cdaad1b1d75b980209c856608d5fbf77cf777a9ccf947a09508ea36daa91fa4a94e2122d4d380d909f1c07fcc1f960f5

  • SSDEEP

    6144:trJbUzkuvcBYC47l2xuNfL2pAgWriSTb3Z9xuzSCR2bS5:tr6kuveY3TT2XdGp9xRC4bS5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f83f81d50f3f37b053e7dea8a988f6e0f7b44f2ee8696ee727b4d5bd4f64d134.exe
    "C:\Users\Admin\AppData\Local\Temp\f83f81d50f3f37b053e7dea8a988f6e0f7b44f2ee8696ee727b4d5bd4f64d134.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin240F.bat"
      2⤵
        PID:1724

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\InstallMate\2CE620EE\cfg\1.ini

            Filesize

            853B

            MD5

            34313da90018ff348d299ee6515866b7

            SHA1

            459bc1c3b3ac1c9216cfde0299e6444386c5ad4f

            SHA256

            a0afc43fa37ff5231375902fcfd67e2f03665069030d682fc389641dfaec1cd4

            SHA512

            a14c349a15e496289ccabc45f73980c87b0b26d2f296b3ac926a11b6c387b5bf1f65a7ead1fb1752d88810179c213682195f6de1671f6a6bd68aa0fb27d92c05

          • C:\Users\Admin\AppData\Local\Temp\_tin240F.bat

            Filesize

            50B

            MD5

            4c5f25488e3c15658b720598f069b452

            SHA1

            93e2dac6116d9fe5673931e5fe3803bbe377e055

            SHA256

            aa152ee15b4e457ff418a4c5460c8bcb020eb2172c29ca5cc810400fe4e258e9

            SHA512

            0411ee0ab2337d88203889f09a0a5977c9d5b1cd8dce331675876c75222aef00d029762640018c6f11c3859d2e6b3551119794be9ed29795d38d05eb40c5301e

          • \Users\Admin\AppData\Local\Temp\TsuE7B7D481.dll

            Filesize

            269KB

            MD5

            af7ce801c8471c5cd19b366333c153c4

            SHA1

            4267749d020a362edbd25434ad65f98b073581f1

            SHA256

            cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

            SHA512

            88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

          • \Users\Admin\AppData\Local\Temp\{D9C4DC0D-D5E5-4A14-A8FF-9DC70227FEFB}\Custom.dll

            Filesize

            91KB

            MD5

            aab03c84db6cba9639d49888a5f0cae1

            SHA1

            f27e6a68da55cb9b6e25b1ddf1c21a77bf6605ae

            SHA256

            72041aa64738b7cfbf8c10d8c8fcadf208240d3d69f0d546e2a923ed9a79cd32

            SHA512

            9c5c935e041d3f7388b9abb4ce20b02a0a9b6d8616182bf717431dac38686f983eb2da2893b60106367970c7a13b845df46279c1a8d64263873ccf1505e731c0

          • \Users\Admin\AppData\Local\Temp\{D9C4DC0D-D5E5-4A14-A8FF-9DC70227FEFB}\_Setup.dll

            Filesize

            173KB

            MD5

            0518cb1e0dc406122ccdabd50aeafb76

            SHA1

            53e860574019872b2a740b4bc345db7972b06a87

            SHA256

            77e1fae9a24895805780626e4a27a75d91528e73830a7dc33b154fb868b70df2

            SHA512

            989fcf7d0a2cec0d8bafeb08f1f4a3a8f44a6a5d4e6831ff993e907d88b8226d89c5235b03e421d4802071edb0787b36c11c39f0faebe7edd2fca9e33989c40c

          • memory/1200-55-0x0000000075AC1000-0x0000000075AC3000-memory.dmp

            Filesize

            8KB