Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 09:37

General

  • Target

    b0685688e517286165cc773a2bc88e337b4d7df5279c8ed8aa549d1baaf88449.exe

  • Size

    192KB

  • MD5

    4c3ba5d81401600cfc2382681fee9f76

  • SHA1

    a54bd8f45aa5cc2ca38da8510e98bfcbd5ab9c4a

  • SHA256

    b0685688e517286165cc773a2bc88e337b4d7df5279c8ed8aa549d1baaf88449

  • SHA512

    361b1cc2dfeb075fef2f7480791737028489d07659cd80c32fb61079e9de3c9bc1f18d28ed90fe37e20626564eca7fa21a7f4be4717f253dc6cd29182c3f9b7a

  • SSDEEP

    3072:pzWrHZJyJekaWxGu8ymle/G9i0Mk5kvllxhC73TsuZfU:6HviL/OAk+llx8LwuZM

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies registry class 7 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0685688e517286165cc773a2bc88e337b4d7df5279c8ed8aa549d1baaf88449.exe
    "C:\Users\Admin\AppData\Local\Temp\b0685688e517286165cc773a2bc88e337b4d7df5279c8ed8aa549d1baaf88449.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\ltgxhzt.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\xecxuw.exe
        "C:\Users\Admin\AppData\Local\Temp\xecxuw.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:2016
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:728

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ltgxhzt.bat

          Filesize

          124B

          MD5

          75da8a1dbe76a72e8d9612833a33f671

          SHA1

          808623560c874db06466663fd859561c5cf6c672

          SHA256

          8cd8e46b5eb2f28f0a5157688b084bd26844e0e3479f8f3194ed5711c6175bed

          SHA512

          a5e79d0dce2286921a8a5858b9ad0a8bcbb987d6f940823a38d301b1bee59275e6f67bfdecf617160d6d89e2da8463f20f1192eddd87c3d69980b65517a07f69

        • C:\Users\Admin\AppData\Local\Temp\vpcbgn.bat

          Filesize

          188B

          MD5

          22ab0a1097c92286077d22e0a0d6d9df

          SHA1

          cc76b9d3e27b2a48292643a7681716c8b9f803c2

          SHA256

          dc021ec350b851c4d86fc76896a42d1ad4fc7b5bcd3d0a828e40945852d259d2

          SHA512

          51e01efa6725b813535ef75f25262e00b4a4a1f8b92709ef35bfe284c97c4d7d544d730268614e61f8434bff296860cbf6645cc4b95071fc9168a206fade9116

        • C:\Users\Admin\AppData\Local\Temp\xecxuw.exe

          Filesize

          144KB

          MD5

          3297ca9bbd5da932f34a083d3cd5bcc0

          SHA1

          2ca3e9404eeca79e698aa18b220be5516c4ef508

          SHA256

          24ae390dbee96696b751605f520da3b089076cc31c25db9bc54586b06f6fb9c0

          SHA512

          7f6cccea99921b4586783ee64733d16f88b51ae34afdb4f999c0e9f7dbbd358763a3930e076513a312aec16534f40e58ffc0f9e866aedde4760c96ef01c4a4e4

        • C:\Users\Admin\AppData\Local\Temp\xecxuw.exe

          Filesize

          144KB

          MD5

          3297ca9bbd5da932f34a083d3cd5bcc0

          SHA1

          2ca3e9404eeca79e698aa18b220be5516c4ef508

          SHA256

          24ae390dbee96696b751605f520da3b089076cc31c25db9bc54586b06f6fb9c0

          SHA512

          7f6cccea99921b4586783ee64733d16f88b51ae34afdb4f999c0e9f7dbbd358763a3930e076513a312aec16534f40e58ffc0f9e866aedde4760c96ef01c4a4e4

        • \Users\Admin\AppData\Local\Temp\xecxuw.exe

          Filesize

          144KB

          MD5

          3297ca9bbd5da932f34a083d3cd5bcc0

          SHA1

          2ca3e9404eeca79e698aa18b220be5516c4ef508

          SHA256

          24ae390dbee96696b751605f520da3b089076cc31c25db9bc54586b06f6fb9c0

          SHA512

          7f6cccea99921b4586783ee64733d16f88b51ae34afdb4f999c0e9f7dbbd358763a3930e076513a312aec16534f40e58ffc0f9e866aedde4760c96ef01c4a4e4

        • \Users\Admin\AppData\Local\Temp\xecxuw.exe

          Filesize

          144KB

          MD5

          3297ca9bbd5da932f34a083d3cd5bcc0

          SHA1

          2ca3e9404eeca79e698aa18b220be5516c4ef508

          SHA256

          24ae390dbee96696b751605f520da3b089076cc31c25db9bc54586b06f6fb9c0

          SHA512

          7f6cccea99921b4586783ee64733d16f88b51ae34afdb4f999c0e9f7dbbd358763a3930e076513a312aec16534f40e58ffc0f9e866aedde4760c96ef01c4a4e4

        • memory/1736-54-0x0000000076411000-0x0000000076413000-memory.dmp

          Filesize

          8KB