Analysis

  • max time kernel
    36s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 19:18

General

  • Target

    4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe

  • Size

    715KB

  • MD5

    4f4b9e4c37c49ad16f3b118b7ff43bdc

  • SHA1

    e0d1b35b3d61fa2835b034dd99446427ad903639

  • SHA256

    4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318

  • SHA512

    a1e0f19d791a0e7581ff5475ee9948a08fb0376fc15128179c1563486ae9862965bb18cdacd4224eb86dc80f45f877d3f5ede3696eb95efa2cd6910e7701b947

  • SSDEEP

    12288:vaYxyeLWtSNrPi37NzHDA6Y1gbl5d7Ifoz4mrNNpRpzqwcQOs0F9FPuIT:vaYxyeLWtkrPi37NzHDA6Yg5dsfoTzhE

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
    "C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\svchost.exe
      "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1372
      • C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
        "C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"
        3⤵
        • Executes dropped EXE
        PID:1000
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    PID:1724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe

    Filesize

    679KB

    MD5

    3910459f67f17a2e1a420895a0d0532a

    SHA1

    241480738e5477cca49f21a3e1e72fced5b68a18

    SHA256

    2bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5

    SHA512

    ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82

  • C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe

    Filesize

    679KB

    MD5

    3910459f67f17a2e1a420895a0d0532a

    SHA1

    241480738e5477cca49f21a3e1e72fced5b68a18

    SHA256

    2bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5

    SHA512

    ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    80d44b4af22b51d176921c8f84eb9081

    SHA1

    47d74b6306da150a27f548f35d88095722cc55ec

    SHA256

    463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed

    SHA512

    91d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    80d44b4af22b51d176921c8f84eb9081

    SHA1

    47d74b6306da150a27f548f35d88095722cc55ec

    SHA256

    463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed

    SHA512

    91d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084

  • C:\Windows\svchost.exe

    Filesize

    35KB

    MD5

    80d44b4af22b51d176921c8f84eb9081

    SHA1

    47d74b6306da150a27f548f35d88095722cc55ec

    SHA256

    463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed

    SHA512

    91d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084

  • \Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe

    Filesize

    679KB

    MD5

    3910459f67f17a2e1a420895a0d0532a

    SHA1

    241480738e5477cca49f21a3e1e72fced5b68a18

    SHA256

    2bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5

    SHA512

    ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82

  • memory/1000-60-0x0000000000000000-mapping.dmp

  • memory/1000-62-0x0000000074C41000-0x0000000074C43000-memory.dmp

    Filesize

    8KB

  • memory/1232-56-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1372-58-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1372-64-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/1372-54-0x0000000000000000-mapping.dmp

  • memory/1724-66-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB