Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 19:58

General

  • Target

    d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.exe

  • Size

    11.4MB

  • MD5

    d6dab04fb28eb7aa0430353e4d3389b2

  • SHA1

    138c08157f567b27840c714d3f474d9529b40ceb

  • SHA256

    d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91

  • SHA512

    dfd43f705baf1f98b90c856c8fb10fde398f5d6892867beed7b9bd0f242dbe961c6ad430467b03b8984541805068ae21eec7b6b4620f02e23c706fa9711810ab

  • SSDEEP

    196608:ZsAynZ5d+aM9bt9fkP8e0R0MsRy/TnU2cbe21rh87OXF8psgVspk67z5R1G:ZsAqYbh9cP89udI/DTcbe21ryO18easA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.exe
    "C:\Users\Admin\AppData\Local\Temp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Users\Admin\AppData\Local\Temp\is-2QBJ6.tmp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2QBJ6.tmp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.tmp" /SL5="$60122,11736252,52224,C:\Users\Admin\AppData\Local\Temp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1940

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-2QBJ6.tmp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.tmp

          Filesize

          703KB

          MD5

          0e651e6fd613a6521feddcd22ae20206

          SHA1

          a2846f013b8b4fffcf348e6cbed4d6ea3189d5cf

          SHA256

          e2e7aa5738b7b81310ae10f64c6fd2a6b234315fc7b52e7570c2be955009d08e

          SHA512

          6c3c3e6182d3bbca098fda428edb647548b2e71254cb48f56082885d6b42bb6b73e97d3caa5d9c9ccf3838456da9f15f958a350672235b148e69142345b63dad

        • \Users\Admin\AppData\Local\Temp\is-2QBJ6.tmp\d74ebc7530caf9f9134e6bc3d8489cec008d3b51eec00be57e1b4f6b7d497d91.tmp

          Filesize

          703KB

          MD5

          0e651e6fd613a6521feddcd22ae20206

          SHA1

          a2846f013b8b4fffcf348e6cbed4d6ea3189d5cf

          SHA256

          e2e7aa5738b7b81310ae10f64c6fd2a6b234315fc7b52e7570c2be955009d08e

          SHA512

          6c3c3e6182d3bbca098fda428edb647548b2e71254cb48f56082885d6b42bb6b73e97d3caa5d9c9ccf3838456da9f15f958a350672235b148e69142345b63dad

        • \Users\Admin\AppData\Local\Temp\is-D1FDT.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-D1FDT.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • memory/1748-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB

        • memory/1748-55-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1748-61-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1748-64-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB