Analysis

  • max time kernel
    164s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:32

General

  • Target

    7739807e862854d6124a59580aec7c81374fecd866333b66d5e893084d6cdb3b.exe

  • Size

    2.8MB

  • MD5

    e7aa116cd5e4659d3c20410e2358ad15

  • SHA1

    20236b92654ee6210550953e67d65ae2760a3a3f

  • SHA256

    7739807e862854d6124a59580aec7c81374fecd866333b66d5e893084d6cdb3b

  • SHA512

    8ab1adfbe98e81eec68d548d519789c1545ea34e72eb22169ddf7467f54586a22ead9ed19bf4e04875d5355c66ecc8d2594767605d9ef20f5f172868fd0f8205

  • SSDEEP

    49152:hNuL2MbupkadC+Xm0qfv2zxGp/aeYXfkHKci1hOO7YaALAz4qacCH:02MbVatXmcS/XYXAK11sOKAz4Z

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7739807e862854d6124a59580aec7c81374fecd866333b66d5e893084d6cdb3b.exe
    "C:\Users\Admin\AppData\Local\Temp\7739807e862854d6124a59580aec7c81374fecd866333b66d5e893084d6cdb3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server1.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 432
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        PID:636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server1.exe

    Filesize

    120KB

    MD5

    16afe1553f88b84f67d1fff0890a7b69

    SHA1

    09c6f2628f0944b45a501c8a466c889f7122075d

    SHA256

    8a707937eb1fc6342f70cea85b5e4572efa2f945c898dfc2bc80a85442824dd9

    SHA512

    cead80448475f8cfdcc3587cbed109ee4d06caafec80a5d9e5cf7da1c2dd003b9aa8a0a1fbfa3a291b00c0a8e1341fbb4e663f245aa03dee4cf94802d2a31e0f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Server1.exe

    Filesize

    120KB

    MD5

    16afe1553f88b84f67d1fff0890a7b69

    SHA1

    09c6f2628f0944b45a501c8a466c889f7122075d

    SHA256

    8a707937eb1fc6342f70cea85b5e4572efa2f945c898dfc2bc80a85442824dd9

    SHA512

    cead80448475f8cfdcc3587cbed109ee4d06caafec80a5d9e5cf7da1c2dd003b9aa8a0a1fbfa3a291b00c0a8e1341fbb4e663f245aa03dee4cf94802d2a31e0f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\Server1.exe

    Filesize

    120KB

    MD5

    16afe1553f88b84f67d1fff0890a7b69

    SHA1

    09c6f2628f0944b45a501c8a466c889f7122075d

    SHA256

    8a707937eb1fc6342f70cea85b5e4572efa2f945c898dfc2bc80a85442824dd9

    SHA512

    cead80448475f8cfdcc3587cbed109ee4d06caafec80a5d9e5cf7da1c2dd003b9aa8a0a1fbfa3a291b00c0a8e1341fbb4e663f245aa03dee4cf94802d2a31e0f

  • memory/636-60-0x0000000000000000-mapping.dmp

  • memory/896-54-0x000007FEFB8A1000-0x000007FEFB8A3000-memory.dmp

    Filesize

    8KB

  • memory/1480-55-0x0000000000000000-mapping.dmp

  • memory/1480-58-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/1480-59-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB

  • memory/1480-63-0x0000000074190000-0x000000007473B000-memory.dmp

    Filesize

    5.7MB