Analysis

  • max time kernel
    3s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 03:35

General

  • Target

    e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe

  • Size

    570KB

  • MD5

    09747cc81ea0cb6035ae36f5cb7ba7d0

  • SHA1

    0ee5fcfd74c334d32d809f1ee87df5be4497630b

  • SHA256

    e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea

  • SHA512

    876c0d74e6954216fd51169f80155b1090428b6223ee8b293c2d02f5fff4fd4bea3368ab915a2663e08c52baa19a9e816534ef006383766976e34cf3a812ea51

  • SSDEEP

    12288:uzvAquvIlhkweD5NxIALRVj+epB042j8XAl5a43OsXlooDPyfVzvAquv:uzvAZOhJyhzBnTAnaSOsVooDKzvAZ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe
    "C:\Users\Admin\AppData\Local\Temp\e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\Naver10.tmp
      C:\Users\Admin\AppData\Local\Temp\Naver10.tmp OK
      2⤵
      • Executes dropped EXE
      PID:1356

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Naver10.tmp

          Filesize

          571KB

          MD5

          410d96f546ee9c09cdce8b9dfff711f4

          SHA1

          fa080f9acaea2ac7f2f0d89674b0e79afbab332b

          SHA256

          c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f

          SHA512

          fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c

        • \Users\Admin\AppData\Local\Temp\Naver10.tmp

          Filesize

          571KB

          MD5

          410d96f546ee9c09cdce8b9dfff711f4

          SHA1

          fa080f9acaea2ac7f2f0d89674b0e79afbab332b

          SHA256

          c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f

          SHA512

          fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c

        • \Users\Admin\AppData\Local\Temp\Naver10.tmp

          Filesize

          571KB

          MD5

          410d96f546ee9c09cdce8b9dfff711f4

          SHA1

          fa080f9acaea2ac7f2f0d89674b0e79afbab332b

          SHA256

          c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f

          SHA512

          fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c

        • memory/1356-60-0x0000000001390000-0x0000000001569000-memory.dmp

          Filesize

          1.8MB

        • memory/1672-54-0x0000000076AE1000-0x0000000076AE3000-memory.dmp

          Filesize

          8KB

        • memory/1672-61-0x0000000000F60000-0x0000000001139000-memory.dmp

          Filesize

          1.8MB

        • memory/1672-62-0x0000000002FE0000-0x00000000031B9000-memory.dmp

          Filesize

          1.8MB

        • memory/1672-63-0x0000000000F60000-0x0000000001139000-memory.dmp

          Filesize

          1.8MB