Analysis

  • max time kernel
    142s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 04:56

General

  • Target

    cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe

  • Size

    119KB

  • MD5

    38a8553384ce564f6ef1e551ecdf42d0

  • SHA1

    39035a968221109efb3c08ca1c35e0a175745092

  • SHA256

    cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616

  • SHA512

    17feb73a05b2d95ab16b1d8ab56041cf39668a45f1ed1a7c1f932660941b787148f641c3d14e2a762b9888aa04b3b4941cee4241f93b65fc63039979aa5c4d45

  • SSDEEP

    1536:cLqMk/alSnyucRNI19X7/B7n2i680WmleFsJlA5XwymMSGIq63AOY6ytwmfbgCt:cLpvVucRNolBngJW4eFUGJXK5ytH

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
    "C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
      C:\Users\Admin\AppData\Local\Temp\cad7a82a9b62893fe91f879be99ad582f9113ef5726c85a115effdb6b2571616.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
        C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
          C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1648

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

    Filesize

    119KB

    MD5

    bbe198fb08cafd58fb20d5e90c09013d

    SHA1

    f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

    SHA256

    f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

    SHA512

    a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

  • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

    Filesize

    119KB

    MD5

    bbe198fb08cafd58fb20d5e90c09013d

    SHA1

    f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

    SHA256

    f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

    SHA512

    a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

  • C:\Users\Admin\AppData\Roaming\cmxjc48cjj.exe

    Filesize

    119KB

    MD5

    bbe198fb08cafd58fb20d5e90c09013d

    SHA1

    f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

    SHA256

    f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

    SHA512

    a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

  • \Users\Admin\AppData\Roaming\cmxjc48cjj.exe

    Filesize

    119KB

    MD5

    bbe198fb08cafd58fb20d5e90c09013d

    SHA1

    f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

    SHA256

    f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

    SHA512

    a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

  • \Users\Admin\AppData\Roaming\cmxjc48cjj.exe

    Filesize

    119KB

    MD5

    bbe198fb08cafd58fb20d5e90c09013d

    SHA1

    f688ec8ee31ab7735a7efeb3b4306c2fa5e96c60

    SHA256

    f5757fe75c45cb7e9c10acaf1a9b5aa05434cb12f2e3474bab6fc8f85e8338b4

    SHA512

    a2539bd5f9fc98b9d591602bb889f8a3c141f804fa886a69d0fef5d2c2fd8ddd6e483d2f6ea1a53289eba32a42b654cd11630a6c51103963c3543aeb7b0b89e4

  • memory/896-59-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/896-60-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/896-65-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/896-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/896-56-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1648-75-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB