Analysis

  • max time kernel
    105s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 17:24

General

  • Target

    ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe

  • Size

    96KB

  • MD5

    7e49975e4ec394b7d8b47e8882ec958d

  • SHA1

    3400efe3544264eba8bdb7eb5d77396639ad1067

  • SHA256

    ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b

  • SHA512

    e7fe122f7a2c816c17e722aa117cef5d041c985a8be23dd05a7450c030c9743ced1d060de05b83e5f112dde08a4689bb777432bd0fb18ae7a7242eefabe49408

  • SSDEEP

    1536:CMFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prRmw2tRs/yR:CeS4jHS8q/3nTzePCwNUh4E9Rmw2QyR

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe
    "C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1256
    • \??\c:\users\admin\appdata\local\enojwjxlgn
      "C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe" a -sc:\users\admin\appdata\local\temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe
      2⤵
      • Executes dropped EXE
      PID:1216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\enojwjxlgn

    Filesize

    22.5MB

    MD5

    60f8609804beb2a44c440f191a0e61f8

    SHA1

    b8fe98699e8da6c3d21c9ca43a8c9e09b434675a

    SHA256

    bff11f93aec9d1c4903507a151f32c8241035b07e61c84b72433a1b96b8ceda4

    SHA512

    11a7be8380f6d8762e59c873ea2b243a8c6febd591504234005bbdf676b4f1ba757492d91e6337d7853dba7b35eb7d6931aa870796c6d57d37086f3ca151e39b

  • \Users\Admin\AppData\Local\enojwjxlgn

    Filesize

    22.5MB

    MD5

    60f8609804beb2a44c440f191a0e61f8

    SHA1

    b8fe98699e8da6c3d21c9ca43a8c9e09b434675a

    SHA256

    bff11f93aec9d1c4903507a151f32c8241035b07e61c84b72433a1b96b8ceda4

    SHA512

    11a7be8380f6d8762e59c873ea2b243a8c6febd591504234005bbdf676b4f1ba757492d91e6337d7853dba7b35eb7d6931aa870796c6d57d37086f3ca151e39b

  • \Users\Admin\AppData\Local\enojwjxlgn

    Filesize

    22.5MB

    MD5

    60f8609804beb2a44c440f191a0e61f8

    SHA1

    b8fe98699e8da6c3d21c9ca43a8c9e09b434675a

    SHA256

    bff11f93aec9d1c4903507a151f32c8241035b07e61c84b72433a1b96b8ceda4

    SHA512

    11a7be8380f6d8762e59c873ea2b243a8c6febd591504234005bbdf676b4f1ba757492d91e6337d7853dba7b35eb7d6931aa870796c6d57d37086f3ca151e39b

  • memory/1216-60-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/1216-61-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/1256-54-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/1256-55-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB