Analysis

  • max time kernel
    42s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 19:38

General

  • Target

    aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1.exe

  • Size

    250KB

  • MD5

    3f3ce27a7c97c64045956757760879a9

  • SHA1

    41ad1c0425ab67d95ce106e02de953a1398323c7

  • SHA256

    aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1

  • SHA512

    57db0b9b425d4dbcc5d795d4e66edb10f8aae7737bbc3484f7b9ca6e827d5ce10fdb0f1c10afef2e6fcc23819ddc183921ea1bcf6ba236f6ab9d714f919fe022

  • SSDEEP

    6144:oxZ3+bJa368M6CkGdSO5wayVv1fofZFsJlN6hq9fimBJ2PN:orUspMkG87ZVdA8NgA/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1.exe
    "C:\Users\Admin\AppData\Local\Temp\aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1.exe
      "C:\Users\Admin\AppData\Local\Temp\aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe
        "C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1028
        • C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe
          "C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:584
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe" /i:584
            5⤵
              PID:1108

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • C:\ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • \ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • \ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • \ProgramData\aJmre8LSmz\3CIx34TYdbyUpW.exe

      Filesize

      250KB

      MD5

      3f3ce27a7c97c64045956757760879a9

      SHA1

      41ad1c0425ab67d95ce106e02de953a1398323c7

      SHA256

      aca1c22260a3300ef143836b217e4ba9f09dde89e5163d24639e7c94121906d1

      SHA512

      57db0b9b425d4dbcc5d795d4e66edb10f8aae7737bbc3484f7b9ca6e827d5ce10fdb0f1c10afef2e6fcc23819ddc183921ea1bcf6ba236f6ab9d714f919fe022

    • \Users\Admin\AppData\Local\Temp\Gim9iQyo1bc95C.exe

      Filesize

      250KB

      MD5

      edd2fbbf4a7ea42c8802ae1e3aa4cf10

      SHA1

      15041e6d90f907b5683d4104f02ebcf1899ad0d1

      SHA256

      aecc6237caec5e2f8749fa0324d09bc7cfb41c480ba2a91e8e6a2aff0be0346c

      SHA512

      79983f3a4e70fd708afa67b52f0f098c47220f7d352e910a06e4e01b40e8f8297e31df20351784b03b77e4106f6a042d996d95d39808c31f915ebc522c4fd3c6

    • memory/584-74-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/584-82-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1108-83-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1108-84-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1724-59-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1724-65-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1724-58-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1724-56-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1724-54-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB