Analysis

  • max time kernel
    3s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 00:00

General

  • Target

    99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe

  • Size

    635KB

  • MD5

    27e1747ba2aea53d7cc56fbfd62932a0

  • SHA1

    5c4b06233af9ee88aec80ee799a2c4f12607ff36

  • SHA256

    99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85

  • SHA512

    f2161aec9505ebd4cc4bd72cf4aa9fc8c7f34807b589a4fe776597051bac3113c0dc31f2688edf47fe6f60b40143cd6cfbcde67a17b66027dc0c448714f7940f

  • SSDEEP

    12288:mEtDt+QFAYvL7+3uhyMNfAsLfozPCOZ/5hNeGX9UZPTjOpMZaBY/x4b7GEtDt+Q:LTdvvdBfAXTBhqt4MZaB3rT

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe
    "C:\Users\Admin\AppData\Local\Temp\99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\~DFA79.tmp
      C:\Users\Admin\AppData\Local\Temp\~DFA79.tmp OK
      2⤵
      • Executes dropped EXE
      PID:948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~DFA79.tmp

    Filesize

    636KB

    MD5

    9a9717f8504a421c9248bdb12dc8ddeb

    SHA1

    a8ff68d180c982c8d643b195fb13a9837ed038b7

    SHA256

    684beb58594407088fb6fdaf63edb3001659e031346e58e7ce0acb1447a74aec

    SHA512

    1808cd95c320e5f08bb61c31f264857472539e8b0704e4020f43ad6431bf111bb86248026b51308694f4f7d111bed2550e788a96e5567817d112b0895aa1dd1b

  • \Users\Admin\AppData\Local\Temp\~DFA79.tmp

    Filesize

    636KB

    MD5

    9a9717f8504a421c9248bdb12dc8ddeb

    SHA1

    a8ff68d180c982c8d643b195fb13a9837ed038b7

    SHA256

    684beb58594407088fb6fdaf63edb3001659e031346e58e7ce0acb1447a74aec

    SHA512

    1808cd95c320e5f08bb61c31f264857472539e8b0704e4020f43ad6431bf111bb86248026b51308694f4f7d111bed2550e788a96e5567817d112b0895aa1dd1b

  • memory/948-61-0x00000000008D0000-0x000000000098F000-memory.dmp

    Filesize

    764KB

  • memory/948-63-0x00000000008D0000-0x000000000098F000-memory.dmp

    Filesize

    764KB

  • memory/2040-54-0x0000000075591000-0x0000000075593000-memory.dmp

    Filesize

    8KB

  • memory/2040-59-0x00000000000B0000-0x000000000016F000-memory.dmp

    Filesize

    764KB

  • memory/2040-60-0x0000000002A40000-0x0000000002AFF000-memory.dmp

    Filesize

    764KB

  • memory/2040-62-0x00000000000B0000-0x000000000016F000-memory.dmp

    Filesize

    764KB