Analysis

  • max time kernel
    252s
  • max time network
    335s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 00:29

General

  • Target

    9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4.exe

  • Size

    375KB

  • MD5

    25a660f83de79eb1eeab82999fb81976

  • SHA1

    1af5ac3e5597168585336157d5110b8d36e5423a

  • SHA256

    9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4

  • SHA512

    3caf33f4e54014016a4f9fd940de54ac0b7a9d487935febf89fc2915c971053816490d345ee07c66fa47aa49a06c0d8fe3e16f391ab0afdfb7f2e8c16546c8c9

  • SSDEEP

    6144:8Uvbx4PkcOz6JmNmxT+hbNNpZZT8AVZzuPChJ:pu8OJm4+h/Z46NJ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4.exe
    "C:\Users\Admin\AppData\Local\Temp\9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4.exe
      "C:\Users\Admin\AppData\Local\Temp\9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\ProgramData\gBqJha4m\rIwc8hVM.exe
        "C:\ProgramData\gBqJha4m\rIwc8hVM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\ProgramData\gBqJha4m\rIwc8hVM.exe
          "C:\ProgramData\gBqJha4m\rIwc8hVM.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe" /i:908
            5⤵
              PID:1804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • C:\ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • C:\ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • \ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • \ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • \ProgramData\gBqJha4m\rIwc8hVM.exe

      Filesize

      375KB

      MD5

      25a660f83de79eb1eeab82999fb81976

      SHA1

      1af5ac3e5597168585336157d5110b8d36e5423a

      SHA256

      9dba29bc5456edd1bd99a60c1006aff1466d24016a120653d7b505939559aec4

      SHA512

      3caf33f4e54014016a4f9fd940de54ac0b7a9d487935febf89fc2915c971053816490d345ee07c66fa47aa49a06c0d8fe3e16f391ab0afdfb7f2e8c16546c8c9

    • \Users\Admin\AppData\Local\Temp\LpfpkeoDqswNGVB.exe

      Filesize

      375KB

      MD5

      90025da0fee6d52952339f10bf955c56

      SHA1

      0faf78857ed03e7dda154be2ebec66f8271aab34

      SHA256

      e03dbd4899b01a6eb1942ad066a0fd8206655bb1caeb73f9ab4121a9abf7c3a9

      SHA512

      473697eeef65394eeeaa34a78d3c9177314e0a5a8ebd9ac46475cca7885730cb7111d002c1d990ea78081d692f37bd4a4ad50b254775a43fde35ed8cd6a0fc88

    • memory/668-59-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/668-58-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/668-65-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/668-61-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/668-56-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/668-54-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/908-76-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/908-83-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1804-84-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB