Analysis

  • max time kernel
    4s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 14:29

General

  • Target

    731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe

  • Size

    2.8MB

  • MD5

    4773d4c54dd30aa65291d050134e7333

  • SHA1

    3ad740c29e481f9b245a31154ce937af77eeb94f

  • SHA256

    731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6

  • SHA512

    84029107b304cc8fadc911f5e6a127bf904b5b98c115cb060fe70ab3097cffa643fce614f2efcf416b13e7f56464508368fd5efb487648f3740764e68455f65c

  • SSDEEP

    49152:bB+kqgBSBGIiRMgmJ4IjRX21LrePOSud0Pr1v9fKxTM+BxcIUveL5Z:bB+vVriR9fIj121LaPbud0D5lKxT5IIN

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe
    "C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp" /SL5="$70022,2560302,52224,C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp

    Filesize

    699KB

    MD5

    2df9dfb907f2fbec57fd5e64f6d68f62

    SHA1

    36c315e1d03c2d4dabc3e8a48889abd1ec97e364

    SHA256

    97eb9ab26eeb54b432e3e83ca4c283e84ef4bce07f6c60a408f57e955f4ddc2b

    SHA512

    14a92aba42e0b61c488978dd9a6f219aa415d2bc767749e5f1bc003155f293149cb42bed03e950467a4d5258e0ec46841ec56de5d6fd87a20fc200eeabbb6856

  • \Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp

    Filesize

    699KB

    MD5

    2df9dfb907f2fbec57fd5e64f6d68f62

    SHA1

    36c315e1d03c2d4dabc3e8a48889abd1ec97e364

    SHA256

    97eb9ab26eeb54b432e3e83ca4c283e84ef4bce07f6c60a408f57e955f4ddc2b

    SHA512

    14a92aba42e0b61c488978dd9a6f219aa415d2bc767749e5f1bc003155f293149cb42bed03e950467a4d5258e0ec46841ec56de5d6fd87a20fc200eeabbb6856

  • \Users\Admin\AppData\Local\Temp\is-HPIB8.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-HPIB8.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-HPIB8.tmp\psvince.dll

    Filesize

    36KB

    MD5

    a4e5c512b047a6d9dc38549161cac4de

    SHA1

    49d3e74f9604a6c61cda04ccc6d3cda87e280dfb

    SHA256

    c7f1e7e866834d9024f97c2b145c09d106e447e8abd65a10a1732116d178e44e

    SHA512

    2edb8a492b8369d56dda735a652c9e08539a5c4709a794efaff91adcae192a636d0545725af16cf8c31b275b34c2f19e4b019b57fb9050b99de65a4c08e3eee1

  • memory/892-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB

  • memory/892-55-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/892-63-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB