Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2023, 18:16

General

  • Target

    c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.exe

  • Size

    12.9MB

  • MD5

    8551795ee3aa4ce1957cd06c29920c7a

  • SHA1

    8194b6987b317e11b60b5d715c72716ac244a7a1

  • SHA256

    c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69

  • SHA512

    63375a423e75052f97e68f8987815871d4802f941185125e294954c8881b9042c1deb32bd5e6d6d5211deef43d903da56d170ea886e8b86df6c3ac2c85275aed

  • SSDEEP

    393216:MLPnefL4lRpOMZqYwQF0HTBNesngJBOY+ZkB:aneD4wMZqLQF0zHe5B2uB

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.exe
    "C:\Users\Admin\AppData\Local\Temp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Users\Admin\AppData\Local\Temp\is-BDOLR.tmp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BDOLR.tmp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.tmp" /SL5="$80022,13121623,124416,C:\Users\Admin\AppData\Local\Temp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2012

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-BDOLR.tmp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.tmp

    Filesize

    1.1MB

    MD5

    465461e619f4e7495ce60358df0f462c

    SHA1

    53559a8e6c0bee30c59a82e299b1b56ed9d2982d

    SHA256

    1411e82ff5b147f98d4cb9ea7a042aca7734b0dde76ea62cd3f4595583ae1e35

    SHA512

    c8eb61f68605e5af1bc16b38cc3a7bd128f8a5ee6834d758dbd960f8d35015f58149b31bf439ded769fa7e4a9cf94b20798f3223c3c96de6ffeed13cbe9cfc0b

  • \Users\Admin\AppData\Local\Temp\is-BDOLR.tmp\c54a1380c1ac692f66f5d607dae32ec6a399406423a442f01379c120923b7e69.tmp

    Filesize

    1.1MB

    MD5

    465461e619f4e7495ce60358df0f462c

    SHA1

    53559a8e6c0bee30c59a82e299b1b56ed9d2982d

    SHA256

    1411e82ff5b147f98d4cb9ea7a042aca7734b0dde76ea62cd3f4595583ae1e35

    SHA512

    c8eb61f68605e5af1bc16b38cc3a7bd128f8a5ee6834d758dbd960f8d35015f58149b31bf439ded769fa7e4a9cf94b20798f3223c3c96de6ffeed13cbe9cfc0b

  • \Users\Admin\AppData\Local\Temp\is-KP8GT.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-KP8GT.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1128-54-0x00000000762E1000-0x00000000762E3000-memory.dmp

    Filesize

    8KB

  • memory/1128-55-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1128-63-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB