Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/11/2022, 21:57

General

  • Target

    6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe

  • Size

    13.4MB

  • MD5

    5190e1f9715babd96b5ce50d6b0fc126

  • SHA1

    d30ffa3f160650defb1c6a4ec710e33ce78dbc9e

  • SHA256

    6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd

  • SHA512

    c7906b42c618a1f305a7fc2f352852339b558424382ac411eda2c781637ef89d1fa6e65f0b51f7f0ab24d767b0bb9c5f72cb82d8962e8719376df51b9a1aa9e3

  • SSDEEP

    393216:H69xMNyqXfwJTATDtKAbxKBSBqBTneng92y:aSycETAPtBb8BSBq1bV

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe
    "C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\is-8UBKL.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8UBKL.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp" /SL5="$A011C,13383306,721408,C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"
      2⤵
      • Executes dropped EXE
      PID:1188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-8UBKL.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp

    Filesize

    2.4MB

    MD5

    71d1ca41a5b735bfa4373267720891ec

    SHA1

    971f80289770bdeb2e06a70c321e9bcbabc56be2

    SHA256

    a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f

    SHA512

    e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2

  • \Users\Admin\AppData\Local\Temp\is-8UBKL.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp

    Filesize

    2.4MB

    MD5

    71d1ca41a5b735bfa4373267720891ec

    SHA1

    971f80289770bdeb2e06a70c321e9bcbabc56be2

    SHA256

    a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f

    SHA512

    e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2

  • memory/1444-54-0x0000000075711000-0x0000000075713000-memory.dmp

    Filesize

    8KB

  • memory/1444-55-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/1444-61-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB