Analysis

  • max time kernel
    147s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 18:51

General

  • Target

    57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe

  • Size

    95KB

  • MD5

    a35f9acfb1d0e109582c4a489d8fd890

  • SHA1

    94d55fbd5e169c882d5cd58c262fcaf73be6bbb5

  • SHA256

    57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c

  • SHA512

    201395205f83736cb2ece2bc0ce74fcd07249b863aa172f067d88bb2b322068cd9f865f2a3ba5ceae4b35bf0e892618dd1444885fad66aada82745c3c7012d33

  • SSDEEP

    1536:zaYQxWlDtiw/L+LCC6nQXqw4QO/2jIy3v5BW4ntGcKe1R+1EVwliV0JX17:mYFkGC6nQXqw4L2R/WCtFU1gV0JX17

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe
    "C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1620
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev737C.tmp!C:\Users\Admin\AppData\Local\Temp\57da2b6ce84340199c7586ef8dedf503dacd7607c9a3d163d87ace54394f194c.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev737C.tmp!C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE

    Filesize

    95KB

    MD5

    d86713571ced7f2e44d7b5c70216aa10

    SHA1

    910e3d9fdec0e28be4b593c16d2244382fecde58

    SHA256

    01db0a62043681e9639e26b95febee487e0fb0f6373d9c40d9bbbdd3a55078b1

    SHA512

    a711c761541c16f9511f912a7228caa39002f376a922776bae1ed18a13364da6ab98bec8b62adf9768a52e2b81da907df9cffcfd1c52b197ad3c4cbb39545415

  • C:\Users\Admin\AppData\Local\Temp\57DA2B6CE84340199C7586EF8DEDF503DACD7607C9A3D163D87ACE54394F194C.EXE

    Filesize

    95KB

    MD5

    d86713571ced7f2e44d7b5c70216aa10

    SHA1

    910e3d9fdec0e28be4b593c16d2244382fecde58

    SHA256

    01db0a62043681e9639e26b95febee487e0fb0f6373d9c40d9bbbdd3a55078b1

    SHA512

    a711c761541c16f9511f912a7228caa39002f376a922776bae1ed18a13364da6ab98bec8b62adf9768a52e2b81da907df9cffcfd1c52b197ad3c4cbb39545415

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    80KB

    MD5

    3ad717b5da6b9cfc84e997a440411b84

    SHA1

    9ee65c7f726bf9bfbac347e41434fcf7446f7bc1

    SHA256

    0a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6

    SHA512

    a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3ad717b5da6b9cfc84e997a440411b84

    SHA1

    9ee65c7f726bf9bfbac347e41434fcf7446f7bc1

    SHA256

    0a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6

    SHA512

    a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3ad717b5da6b9cfc84e997a440411b84

    SHA1

    9ee65c7f726bf9bfbac347e41434fcf7446f7bc1

    SHA256

    0a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6

    SHA512

    a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    3ad717b5da6b9cfc84e997a440411b84

    SHA1

    9ee65c7f726bf9bfbac347e41434fcf7446f7bc1

    SHA256

    0a1f11aa676e9077e466256eac57ba30eafa57c8fb9201d05b1aef2aa1b0bbf6

    SHA512

    a4d9d5670bbb6a5c93c159f83d43d41207281cfe37273292ba2e6e73efd98319742a9c3d52593f1cd98365bd4808858839fe83bed95b6b80f658ec207cf655db

  • C:\Windows\dev737C.tmp

    Filesize

    15KB

    MD5

    b3e875aa5bc8a616eb056e6980f476bc

    SHA1

    64ba0e739860ee28d93865846a932e36d9b41e29

    SHA256

    f147270269d91748da1dddd07d6f7248cca65dc11b8084d10f147f18624a21a5

    SHA512

    a4698569314cd01ba06103d79c9c742a39fd3d142bb54b1a2bbab85a91ba4a39ce85863de87069915e5276dc8077f940a741439bd44b14257d54adb8888be3dc

  • memory/1612-59-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1612-54-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1620-69-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1620-68-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1944-65-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1956-67-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB