Analysis

  • max time kernel
    46s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 10:18

General

  • Target

    3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.exe

  • Size

    4.5MB

  • MD5

    ae27df39a0264b9dae8b03e90fd08ec5

  • SHA1

    442c2b2a6b8ba5ea2a62adebb43f85dfec6820ba

  • SHA256

    3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d

  • SHA512

    ed6615b72d1a5061b7190b6958316299ce61e7e38293bb6cfb675d64b849446482fee24b8ffb35deb9b2fdb982a3bb248a6c6394b9ff9ea738eaf66f8b4b8387

  • SSDEEP

    98304:myMvHuUfKPFPA+mPlqzaQlnA2hf7lKVwEwv4SgnLFRaH:m7HuUam1lqzrPVlKVwD4ScS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.exe
    "C:\Users\Admin\AppData\Local\Temp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\is-Q6CH4.tmp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-Q6CH4.tmp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.tmp" /SL5="$70124,4230031,139264,C:\Users\Admin\AppData\Local\Temp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.exe"
      2⤵
      • Executes dropped EXE
      PID:1208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-Q6CH4.tmp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.tmp

    Filesize

    1.1MB

    MD5

    3a3bfd8ddae8d71bdd6383e123e72d32

    SHA1

    6edae03990222615f9e554d6fc2a15134372c467

    SHA256

    bb804b87a06442ca8e503f81bcbd5e1030b03127a9b58139847cca1440d19413

    SHA512

    fc3d345b976d89d7158601cb19e6d9bf0e08b7967a15e46f2586d8240e75d22615616d7a060149d92fc4833920ae64abbddb462e69843b749e3cc012f007b0ff

  • \Users\Admin\AppData\Local\Temp\is-Q6CH4.tmp\3f13c64fc17655ae041f4df98d506329881f7ed38935d8aeb2397c1a01ae987d.tmp

    Filesize

    1.1MB

    MD5

    3a3bfd8ddae8d71bdd6383e123e72d32

    SHA1

    6edae03990222615f9e554d6fc2a15134372c467

    SHA256

    bb804b87a06442ca8e503f81bcbd5e1030b03127a9b58139847cca1440d19413

    SHA512

    fc3d345b976d89d7158601cb19e6d9bf0e08b7967a15e46f2586d8240e75d22615616d7a060149d92fc4833920ae64abbddb462e69843b749e3cc012f007b0ff

  • memory/1380-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/1380-55-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1380-61-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB