Analysis

  • max time kernel
    48s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 14:11

General

  • Target

    de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe

  • Size

    200KB

  • MD5

    95d570525788f368d0f5f82ab1d59f4c

  • SHA1

    c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146

  • SHA256

    de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d

  • SHA512

    e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a

  • SSDEEP

    3072:2fh3Z9RXDsFSAuQutZtr6YI7qPD56xe4oBM5+N9uywrZ3xcMSkSAxa:cRQup6Y775cF5+Hu5rZ3HNa

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe
    "C:\Users\Admin\AppData\Local\Temp\de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47MSMLLMS.EXE
      "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47MSMLLMS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:996
    • C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47O7BA.EXE
      "C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47O7BA.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RWNW47MSMLLMS.EXE

    Filesize

    200KB

    MD5

    95d570525788f368d0f5f82ab1d59f4c

    SHA1

    c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146

    SHA256

    de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d

    SHA512

    e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a

  • C:\Users\Admin\AppData\Local\Temp\RWNW47O7BA.EXE

    Filesize

    24KB

    MD5

    84d305b680807aa668af0d5b09cab960

    SHA1

    80e5b871f0f967e134c644bd93abf5d2a68c1a94

    SHA256

    d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c

    SHA512

    3e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51

  • C:\Users\Admin\Local Settings\Application Data\81192114\tst

    Filesize

    10B

    MD5

    dfdaa4d245e453f865ce39b0b12b12ae

    SHA1

    3f709971c7a1f69d247e28eaf7dc53126c501823

    SHA256

    4823d7d21c7faade58b12c59b64ebed74c8014d757904fd7152d29240b4e6872

    SHA512

    2b83d351876158812155f1aa43fd1e2404f90b0f375f17f9b5d7a36bfb4211fe3a06124b3a1a807db5b2e0e265069e94b361425596e9c8867cb3bc05f5e72a67

  • \Users\Admin\AppData\Local\Temp\RWNW47MSMLLMS.EXE

    Filesize

    200KB

    MD5

    95d570525788f368d0f5f82ab1d59f4c

    SHA1

    c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146

    SHA256

    de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d

    SHA512

    e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a

  • \Users\Admin\AppData\Local\Temp\RWNW47MSMLLMS.EXE

    Filesize

    200KB

    MD5

    95d570525788f368d0f5f82ab1d59f4c

    SHA1

    c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146

    SHA256

    de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d

    SHA512

    e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a

  • \Users\Admin\AppData\Local\Temp\RWNW47O7BA.EXE

    Filesize

    24KB

    MD5

    84d305b680807aa668af0d5b09cab960

    SHA1

    80e5b871f0f967e134c644bd93abf5d2a68c1a94

    SHA256

    d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c

    SHA512

    3e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51

  • \Users\Admin\AppData\Local\Temp\RWNW47O7BA.EXE

    Filesize

    24KB

    MD5

    84d305b680807aa668af0d5b09cab960

    SHA1

    80e5b871f0f967e134c644bd93abf5d2a68c1a94

    SHA256

    d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c

    SHA512

    3e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51

  • memory/556-63-0x0000000000000000-mapping.dmp

  • memory/996-56-0x0000000000000000-mapping.dmp

  • memory/996-60-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1720-59-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1720-65-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB