Analysis

  • max time kernel
    31s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 03:53

General

  • Target

    3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe

  • Size

    72KB

  • MD5

    0c3db4408cf9bbc6aa50a19792832af0

  • SHA1

    3c9872aa3163d6d2cf51535b552068bdd457c8d2

  • SHA256

    3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c

  • SHA512

    e3c5a5f6040cfe5929b1b0a22e30780591b790c2b4912052f5d44d7843daa5e7d2c04d85c75eb4ed2334d526fac5fe08011a04170e2ac0c212f145ae8940fd9a

  • SSDEEP

    1536:B+HTyoSc9CzlJ62Dp76vRFzUrTgZQoPig3GcG995sNI:e+sc8dUrTAW7

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe
    "C:\Users\Admin\AppData\Local\Temp\3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    72KB

    MD5

    7fc33887b26592c0f2ccfcd79d2cdcbb

    SHA1

    9d05b772d50d79b76c38b62f642262f6c0a326e8

    SHA256

    b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427

    SHA512

    ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    72KB

    MD5

    7fc33887b26592c0f2ccfcd79d2cdcbb

    SHA1

    9d05b772d50d79b76c38b62f642262f6c0a326e8

    SHA256

    b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427

    SHA512

    ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    72KB

    MD5

    7fc33887b26592c0f2ccfcd79d2cdcbb

    SHA1

    9d05b772d50d79b76c38b62f642262f6c0a326e8

    SHA256

    b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427

    SHA512

    ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42

  • \Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    72KB

    MD5

    7fc33887b26592c0f2ccfcd79d2cdcbb

    SHA1

    9d05b772d50d79b76c38b62f642262f6c0a326e8

    SHA256

    b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427

    SHA512

    ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42