Analysis

  • max time kernel
    166s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 10:11

General

  • Target

    cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe

  • Size

    22KB

  • MD5

    c8a8f049313d1c67f1baaf338fe5ede0

  • SHA1

    bf1caa4b3356715a399a8763e5ff3cc9ab42fb25

  • SHA256

    cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe

  • SHA512

    8784747f0de0d0ca5e34202242ea7e4ec0df86182c16d0ec399ccca62f043c4c660516ef6b57cff282023a308c75f6bf7c9dc40c6e25199fd4cf05f33d352f15

  • SSDEEP

    384:cCnTQbG5J20LgQC0wrDii13hxBRLcVuR5MG1pvSRrtp82xsTTTTqxTTTTTTTT:VMq5cTpVDiUTKuR5BpSRrtp82

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe
    "C:\Users\Admin\AppData\Local\Temp\cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\njsou.exe
      C:\Users\Admin\AppData\Local\Temp\njsou.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      PID:1320

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\njsou.exe

          Filesize

          22KB

          MD5

          96ea95d266c46702f0647d31ce7fe93f

          SHA1

          fa798dfce6db31d20d903bc34cecf815684b62c5

          SHA256

          c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1

          SHA512

          f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436

        • C:\Users\Admin\AppData\Local\Temp\njsou.exe

          Filesize

          22KB

          MD5

          96ea95d266c46702f0647d31ce7fe93f

          SHA1

          fa798dfce6db31d20d903bc34cecf815684b62c5

          SHA256

          c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1

          SHA512

          f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436

        • \Users\Admin\AppData\Local\Temp\njsou.exe

          Filesize

          22KB

          MD5

          96ea95d266c46702f0647d31ce7fe93f

          SHA1

          fa798dfce6db31d20d903bc34cecf815684b62c5

          SHA256

          c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1

          SHA512

          f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436

        • memory/1320-59-0x0000000075771000-0x0000000075773000-memory.dmp

          Filesize

          8KB

        • memory/1320-60-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/1712-57-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB