Analysis

  • max time kernel
    152s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:35

General

  • Target

    a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe

  • Size

    196KB

  • MD5

    15000c34c7486e8752a944daf068bd70

  • SHA1

    326a8528d489d951b745d436404587ec4a3141e1

  • SHA256

    a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3

  • SHA512

    34eafeaec968224a2e778e232b0599e75fe9816f2b650ef825b974bcb941ff6a5cc4d6a7d0565c6e06fd8dd4f64ae225d0559628d81fc3292a8b51a3bd4e198f

  • SSDEEP

    1536:jZ/fgkAqJlV+n1EgGHo7P1YPx28Vayon5sn:j1gkZl0nt/P1YPx/on0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe
    "C:\Users\Admin\AppData\Local\Temp\a2c549cdd28fc49eca71c79a8ecc7de45ebc6678b1e448736593507f6927abb3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Program Files (x86)\6265744d\jusched.exe
      "C:\Program Files (x86)\6265744d\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\6265744d\6265744d

    Filesize

    17B

    MD5

    80e7928b124479791c52c09d831495f6

    SHA1

    94c8cb5ce4b1c1e70a2802efc22395c1003fc8bd

    SHA256

    a6bb92ad6bdd253818b2660e9befc8e3689b3bee61233f7a67a6ca0695acab12

    SHA512

    5183e48a8dc4f64277b7a0303f97b704ffa63dcc7256aaddb69994ef108f2f2922d9ec9a62eda403eed6c4f66dd719297c9d24e997f662eded63a49810493d2d

  • C:\Program Files (x86)\6265744d\jusched.exe

    Filesize

    196KB

    MD5

    4309a8b44592a7c968652efe41b06c09

    SHA1

    a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65

    SHA256

    2f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd

    SHA512

    0831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24

  • \Program Files (x86)\6265744d\jusched.exe

    Filesize

    196KB

    MD5

    4309a8b44592a7c968652efe41b06c09

    SHA1

    a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65

    SHA256

    2f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd

    SHA512

    0831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24

  • \Program Files (x86)\6265744d\jusched.exe

    Filesize

    196KB

    MD5

    4309a8b44592a7c968652efe41b06c09

    SHA1

    a4d91e9f6a911d01acf87dd8fc8ca5e0fd186e65

    SHA256

    2f507af43c6da9da6073c30e06ee28ccfe3565007697ee7537b1653953058afd

    SHA512

    0831ed45aea6f44561d2ee038e5ebfa217fc5648296bd2a1454516015e50fd824247bbef59de75ee11288b4b5dcb90afa91c03bc1c544a66bd19622c6a11ac24

  • memory/480-57-0x0000000000000000-mapping.dmp

  • memory/1484-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB