Analysis

  • max time kernel
    35s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 06:02

General

  • Target

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe

  • Size

    85KB

  • MD5

    936b3450aad167eab25b9dc9f80a0b44

  • SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

  • SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

  • SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • SSDEEP

    1536:8PFYgIzz2OQdfgB3KEkWAfN8pO2D1hjuWOmeVXQVVzL:/ZzIQZk9fN8RjurfgV9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe
    "C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe
      "C:\Users\Admin\AppData\Local\Temp\0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe
        "C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:948
        • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe
          "C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe"
          4⤵
          • Executes dropped EXE
          PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • C:\Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • \Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • \Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • \Users\Admin\AppData\Local\Temp\sesdessetri.exe

    Filesize

    85KB

    MD5

    936b3450aad167eab25b9dc9f80a0b44

    SHA1

    20021055e1e66e41f747d7099aa6e977c32d56b8

    SHA256

    0f8ba8b3d14e8d823c2daaa728b62dd3392b9dd297bd0bd081d5f8ffec90acc5

    SHA512

    dea25ea303c148de243c4f8c382dc6c570c8aec89dd9484969049621c3d42226ee56d2f24ea3abe26d43625974b26aa8a23b6662b66ad47ce0fd46127fb73e61

  • memory/900-64-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/900-61-0x0000000075921000-0x0000000075923000-memory.dmp

    Filesize

    8KB

  • memory/900-63-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/900-81-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/900-58-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/900-57-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/948-78-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1376-62-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1376-55-0x0000000000400000-0x000000000044A000-memory.dmp

    Filesize

    296KB

  • memory/1956-82-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1956-83-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1956-84-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB