Analysis

  • max time kernel
    156s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 21:03

General

  • Target

    a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

  • Size

    275KB

  • MD5

    43ffeada436ffce3ea901868413f7620

  • SHA1

    50054ebc6f88f3ab45771f3f3fb05d13e3019628

  • SHA256

    a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e

  • SHA512

    4bff350d3a683598d2282f7bb7e0832ba2f0db0441a9fcfc0a848f8871394e648314f6d89f2685646b791787d3fac524eb185ee7dd870c82e8f49cbacfc6d56f

  • SSDEEP

    3072:86jI9XJy7r9C88KuCHBTTZJ/bxKOzCJhVnCMkoU97Qe5HZB5ksrHFZqTTeTTTfqy:fUZyo83nLbxKVJ3nCMkQe5HZAsHFZlxx

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe
    "C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1256
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev32D4.tmp!C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1996
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev32D4.tmp!C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • C:\Users\Admin\AppData\Local\Temp\A66BEEF17C0078A79A8BC278120E04ABEE9ED06576E68BF285340C9A71CB813E.EXE

    Filesize

    275KB

    MD5

    fd2f225a50053b1cc087be28ba862eaf

    SHA1

    040e39ca6ec08a252c665b76a921da05edab0f07

    SHA256

    4252a32501c0890c33726c961d4ad5b60bcfb1fa11f0c77510c5b0fa8f4c1776

    SHA512

    a1cbd58fd1aac5ae755a0074a756ef81d48f399759a48373c35774777892388b7b47583840253ed5c43e3e1a39aebf42c74ff83bb4042202f569f34015dbf25c

  • C:\Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • C:\WINDOWS\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\MSWDM.EXE

    Filesize

    39KB

    MD5

    da5dbe204364f504e867df8fdde72131

    SHA1

    90ddd63ff3746f8367a90a12a58fe23a59aba5fa

    SHA256

    a512441a0d5ba5253aee2160c9c5113e661b7212835dbcec0a97bd078b5c19ea

    SHA512

    334a610a51cbde9180c72d4c7d29e5fc2568e9521539496e5d906848ae0be6881073bdcd26f703e9cef907ae01557b7a8ab1dc3dd0a4d962b2da2b63e9a56685

  • C:\Windows\dev32D4.tmp

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • \Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • \Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • \Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • \Users\Admin\AppData\Local\Temp\a66beef17c0078a79a8bc278120e04abee9ed06576e68bf285340c9a71cb813e.exe

    Filesize

    236KB

    MD5

    d095376682210d6ddcaeb636500eb0cb

    SHA1

    f3ba099deee863c83f78e1814eb345b56560b11a

    SHA256

    06b96b0d863b16f1ee7e705a6e463e74dc0bad110a2ecd69dc44349bf4aeaf71

    SHA512

    546874c3a4af3666c78c3d4085498c4524b19b226472f9da38cf96559993def11eeaa7dcd6af72a236cd73bffa01182ac42499696a0b60d09d23b22b9adb5c7a

  • memory/1256-76-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1256-54-0x0000000000000000-mapping.dmp

  • memory/1256-70-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1324-73-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1324-71-0x0000000000000000-mapping.dmp

  • memory/1752-69-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1752-75-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1752-56-0x0000000000000000-mapping.dmp

  • memory/1964-57-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1996-64-0x0000000075BA1000-0x0000000075BA3000-memory.dmp

    Filesize

    8KB

  • memory/1996-62-0x0000000000000000-mapping.dmp