Analysis

  • max time kernel
    17s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-10-2022 08:45

General

  • Target

    6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe

  • Size

    632KB

  • MD5

    93f49df0209e5c237043af1e937f6fe3

  • SHA1

    9088a61627458eda67e5df86cd60f823a1077d80

  • SHA256

    6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec

  • SHA512

    2cf037286c07174aabfd0a35b9f64febb65d7021542ba75664edd555781b58320decb5553f270cc8afc24970a261f2bc2a580feffe70d26b2f9bf5308d56c89b

  • SSDEEP

    12288:h6Qyv5+vt/2z9olD6669/M+l6nRSciC1qfyI2stDzZ6JvEl+UgKsXBeGdnbH:hO5+v4olDK9/M/PhqV2+Z6JvJVKYeGdr

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe
    "C:\Users\Admin\AppData\Local\Temp\6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:272
    • C:\Users\Admin\AppData\Local\Temp\~DFA65.tmp
      C:\Users\Admin\AppData\Local\Temp\~DFA65.tmp OK
      2⤵
      • Executes dropped EXE
      PID:1972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~DFA65.tmp

    Filesize

    633KB

    MD5

    ede05f543e88de4709e778e162d3c160

    SHA1

    e62e78f38eb4a3e7e00d7d0c65527a95493145e1

    SHA256

    6a20ca528fc25c39c006db7b3ee6bdfeef605330133b8cc99e86efcae1793ed1

    SHA512

    5125dd7d244b9aa157e67ff341db29a6af832837505702d65953b8680ca8eb285fdc45d23a1f5c29351ccc36a9f3df482ea3d7ffbf5e28d650e3db9af973ad05

  • \Users\Admin\AppData\Local\Temp\~DFA65.tmp

    Filesize

    633KB

    MD5

    ede05f543e88de4709e778e162d3c160

    SHA1

    e62e78f38eb4a3e7e00d7d0c65527a95493145e1

    SHA256

    6a20ca528fc25c39c006db7b3ee6bdfeef605330133b8cc99e86efcae1793ed1

    SHA512

    5125dd7d244b9aa157e67ff341db29a6af832837505702d65953b8680ca8eb285fdc45d23a1f5c29351ccc36a9f3df482ea3d7ffbf5e28d650e3db9af973ad05

  • memory/272-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/272-59-0x00000000008C0000-0x000000000097F000-memory.dmp

    Filesize

    764KB

  • memory/1972-56-0x0000000000000000-mapping.dmp

  • memory/1972-60-0x0000000000DF0000-0x0000000000EAF000-memory.dmp

    Filesize

    764KB

  • memory/1972-61-0x0000000000DF0000-0x0000000000EAF000-memory.dmp

    Filesize

    764KB