Analysis

  • max time kernel
    129s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:12

General

  • Target

    f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe

  • Size

    131KB

  • MD5

    40ac16daa9c2f2b8f82b036938b2412a

  • SHA1

    0cc85169d156bd25dab370a2f1bf712f3164ab49

  • SHA256

    f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1

  • SHA512

    5cb7918fb1132a8c45dddbdc65db3d8b1fd2db5a3f95f2b208271c5efbbb40f7509c2c248a5ae49c3c8f9be3b4d95fe64437898a12119cf0c3a3be8f57bd4f84

  • SSDEEP

    3072:lEH+GiEs2SMylNOjyFbxJa5emEIr9E9njkKr3McVmySRyE6Uiowf5:lsehzRFW9rC5vV/SRS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe
    "C:\Users\Admin\AppData\Local\Temp\f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 268
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1272

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE

    Filesize

    83KB

    MD5

    95e1f5f720d02aad94f20f057513589c

    SHA1

    11af5c0af38fa3c69d191b4f617f07f42980a5db

    SHA256

    2775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205

    SHA512

    bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7

  • memory/864-65-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/864-64-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/864-56-0x0000000000000000-mapping.dmp

  • memory/1272-66-0x0000000000000000-mapping.dmp

  • memory/1372-63-0x0000000000190000-0x00000000001BD000-memory.dmp

    Filesize

    180KB

  • memory/1372-54-0x0000000076B51000-0x0000000076B53000-memory.dmp

    Filesize

    8KB

  • memory/1372-72-0x0000000000190000-0x00000000001BD000-memory.dmp

    Filesize

    180KB