Analysis

  • max time kernel
    5s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 10:11

General

  • Target

    1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.exe

  • Size

    1.6MB

  • MD5

    62677425ebcab450138ee210381900e8

  • SHA1

    61b1492bc07b9f8cf289d8f39155bd1203cabe90

  • SHA256

    1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be

  • SHA512

    3b3d3f7a112012b1dd1e852223aae587d65a1ee661fb58148bcf4338ee06cf9564b0641c59f37f3d807b20453a964c0aae2671ac92d3b5f0bb69f8cc6d0bdadd

  • SSDEEP

    24576:y7FUDowAyrTVE3U5FwwTZl3ATUwW1r8DPq7r43be9Hyht9Pq34o38Oh:yBuZrEU1PBmDiH4SIt9PqoO1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.exe
    "C:\Users\Admin\AppData\Local\Temp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Users\Admin\AppData\Local\Temp\is-4P9K4.tmp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4P9K4.tmp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.tmp" /SL5="$60120,856139,785920,C:\Users\Admin\AppData\Local\Temp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.exe"
      2⤵
      • Executes dropped EXE
      PID:1340

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-4P9K4.tmp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.tmp

          Filesize

          3.0MB

          MD5

          d7703fbe972ac7cd02079acf37fe4168

          SHA1

          ad4556fb7a441970e94b3d7bc8df502443c87c7b

          SHA256

          cb6fbc7560c614d581879478e3f79730e72153f3dfe310e1adb45cc5750ef824

          SHA512

          aadcb218cdb0fbe391274d95995919813efae7f6376d110cb2c8eef2064fdfcd204d2ca460a79cd5fb06274e72cd6f86ddfec71f00cd12193c27593eca56e0b2

        • \Users\Admin\AppData\Local\Temp\is-4P9K4.tmp\1ad8005a9a6bbbd85014507d6525f57ba86c8a7fb4659006ede32adc747134be.tmp

          Filesize

          3.0MB

          MD5

          d7703fbe972ac7cd02079acf37fe4168

          SHA1

          ad4556fb7a441970e94b3d7bc8df502443c87c7b

          SHA256

          cb6fbc7560c614d581879478e3f79730e72153f3dfe310e1adb45cc5750ef824

          SHA512

          aadcb218cdb0fbe391274d95995919813efae7f6376d110cb2c8eef2064fdfcd204d2ca460a79cd5fb06274e72cd6f86ddfec71f00cd12193c27593eca56e0b2

        • memory/1536-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

          Filesize

          8KB

        • memory/1536-55-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB

        • memory/1536-61-0x0000000000400000-0x00000000004CD000-memory.dmp

          Filesize

          820KB