Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 14:24

General

  • Target

    7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.exe

  • Size

    122KB

  • MD5

    a28017da00cf14a5ede09d875bbb3d20

  • SHA1

    7d912a78c353c2ce1c2abc5e6a50e395aec30430

  • SHA256

    7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558

  • SHA512

    bba6b04cdf09634ce5d6e5739f0673868dfd4bf7e00e66e43f69d74571fae89f702290a6029892d5b280ba68dccbe5318afc93f1b824108ba21abf8c3264d79f

  • SSDEEP

    3072:sdmtrAHFRpxvMDk67fXf4b2IEUAEWkGpg:s4UHFnuDk67fe2a

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.exe
        "C:\Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.com
          C:\Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.com
          3⤵
          • Executes dropped EXE
          PID:1252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.com

      Filesize

      34KB

      MD5

      0a9fce9a01a17a7cb16cd0094753a943

      SHA1

      06dba5dc74d1b4b75b06de180deb5e0eb8a102ed

      SHA256

      c3eb7554ee0fe4c018b7b560eb7f9ed326f942e6cba3640de90e4d63595cbb5a

      SHA512

      ea918f221a50dfe8c46d8f28a7386879cfd34886602949d5ed2548b25d5eef78e8a51f064f1fb853d53812bc9a13f55d1fc2fe55c0f0bae951c3f96f2c025327

    • \Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.com

      Filesize

      34KB

      MD5

      0a9fce9a01a17a7cb16cd0094753a943

      SHA1

      06dba5dc74d1b4b75b06de180deb5e0eb8a102ed

      SHA256

      c3eb7554ee0fe4c018b7b560eb7f9ed326f942e6cba3640de90e4d63595cbb5a

      SHA512

      ea918f221a50dfe8c46d8f28a7386879cfd34886602949d5ed2548b25d5eef78e8a51f064f1fb853d53812bc9a13f55d1fc2fe55c0f0bae951c3f96f2c025327

    • \Users\Admin\AppData\Local\Temp\7c1ae536177733b17e09d83a109992aae586c1177907e427a0783043aabb3558.com

      Filesize

      34KB

      MD5

      0a9fce9a01a17a7cb16cd0094753a943

      SHA1

      06dba5dc74d1b4b75b06de180deb5e0eb8a102ed

      SHA256

      c3eb7554ee0fe4c018b7b560eb7f9ed326f942e6cba3640de90e4d63595cbb5a

      SHA512

      ea918f221a50dfe8c46d8f28a7386879cfd34886602949d5ed2548b25d5eef78e8a51f064f1fb853d53812bc9a13f55d1fc2fe55c0f0bae951c3f96f2c025327