Analysis

  • max time kernel
    150s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 18:27

General

  • Target

    bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe

  • Size

    351KB

  • MD5

    37f5f56f232203bb60b0036b94c3dc85

  • SHA1

    39ec98058f108aa884d76b718e800091a2e9438c

  • SHA256

    bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9

  • SHA512

    8e9a19e02cd25cec1a4eebb30840fea09f49602bd6fa8cf3e2711dbf64736da43e341ae07cc2367892eac9b5e2e12a77f7ae95a7346c18c6910035fafe56e7ca

  • SSDEEP

    6144:Z3c4cg0RO2MTBtGIPaK8KKNYC5RaAcF3FPj5DoXF93pqrQ:ZiBTM98yaKWYCqA6FPj5EXT4Q

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe
    "C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe
      "C:\Users\Admin\AppData\Local\Temp\bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe
        "C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe
          "C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1824
          • C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe
            "C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe" /i:1824
            5⤵
              PID:864

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • C:\ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • \ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • \ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • \ProgramData\PtwU4DW7t2Q7H9Py\lBkDyW175o.exe

      Filesize

      351KB

      MD5

      37f5f56f232203bb60b0036b94c3dc85

      SHA1

      39ec98058f108aa884d76b718e800091a2e9438c

      SHA256

      bf47a3b1e9fb90a8ccf05644185f319a034c04a9d3b0b52a21a45ca7bd0d1bc9

      SHA512

      8e9a19e02cd25cec1a4eebb30840fea09f49602bd6fa8cf3e2711dbf64736da43e341ae07cc2367892eac9b5e2e12a77f7ae95a7346c18c6910035fafe56e7ca

    • \Users\Admin\AppData\Local\Temp\gMO9jbw92XC.exe

      Filesize

      351KB

      MD5

      fac8210e33fc49e93af00aad0833c6d6

      SHA1

      fa89c869149d43775d5a4f450cd147de1c6da3ac

      SHA256

      6f98c666a4d51a1fc2019d02b0ac7de4e11b3c36f1b74c15a0cc3bafa2137531

      SHA512

      8f1a90a01118586752fb24fa54096f1172524e884d8db37653cafe77c1c15354354b4c68083cd15c15714a4db0bd5001a49cc2a1d7b2b0a76f909df96e5cecf6

    • memory/864-83-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/864-84-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1692-59-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1692-65-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1692-58-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1692-54-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1692-56-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1824-82-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1824-75-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB