Analysis

  • max time kernel
    41s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 06:53

General

  • Target

    c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.exe

  • Size

    11.5MB

  • MD5

    22e5a612dc472d16b7097f2ce4996158

  • SHA1

    ff4e48dce0820e7598cad0182f5ee86a24f7a1e7

  • SHA256

    c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7

  • SHA512

    529dc32299ca7ebd0f29319bf959dcf6c950bd3702e964ba0ac05cd21959381de4764775a2f9190bcc14de01ad2ec96d1d62eacfbfd5a72c875570b0cb7f99ce

  • SSDEEP

    196608:nJDxv6K9NG3V/NptBPmOevfhaEO6QMmjs/1dqc8pH9pjCTdyRPEurBjTmRxx3GFd:JFv6gG3VztpOZaEuQ/iVd1CJydNK3x3q

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.exe
    "C:\Users\Admin\AppData\Local\Temp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\is-FIBSG.tmp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FIBSG.tmp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.tmp" /SL5="$60120,11321049,781312,C:\Users\Admin\AppData\Local\Temp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-FIBSG.tmp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.tmp

    Filesize

    2.5MB

    MD5

    8a51d4ca9fb837d4dd799c8355dcca11

    SHA1

    8324513877aa7dfaf3b87f67d641f5ddbdc03b3a

    SHA256

    8d1567882e04bb06c7bca28f267bb93aef60c0a78cb34ef418868a26005dc89f

    SHA512

    58977bdc72739264a2ff98ee1e7fcbdfd4cbb65fcb910150448d810e65d9f8d3680446e868230e0cb9cb792f7566817070cd80f5b59fc267094a8953614e8c96

  • \Users\Admin\AppData\Local\Temp\is-FIBSG.tmp\c300df164718575cb6a17ddc8384231fb4f55b04718fda640cc4f23fab4077c7.tmp

    Filesize

    2.5MB

    MD5

    8a51d4ca9fb837d4dd799c8355dcca11

    SHA1

    8324513877aa7dfaf3b87f67d641f5ddbdc03b3a

    SHA256

    8d1567882e04bb06c7bca28f267bb93aef60c0a78cb34ef418868a26005dc89f

    SHA512

    58977bdc72739264a2ff98ee1e7fcbdfd4cbb65fcb910150448d810e65d9f8d3680446e868230e0cb9cb792f7566817070cd80f5b59fc267094a8953614e8c96

  • \Users\Admin\AppData\Local\Temp\is-IKRBM.tmp\isxdl.dll

    Filesize

    121KB

    MD5

    48ad1a1c893ce7bf456277a0a085ed01

    SHA1

    803997ef17eedf50969115c529a2bf8de585dc91

    SHA256

    b0cc4697b2fd1b4163fddca2050fc62a9e7d221864f1bd11e739144c90b685b3

    SHA512

    7c9e7fe9f00c62cccb5921cb55ba0dd96a0077ad52962473c1e79cda1fd9aa101129637043955703121443e1f8b6b2860cd4dfdb71052b20a322e05deed101a4

  • memory/1520-59-0x0000000000000000-mapping.dmp

  • memory/1944-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

    Filesize

    8KB

  • memory/1944-55-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1944-57-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1944-63-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB