Analysis

  • max time kernel
    40s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2023 18:27

General

  • Target

    df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe

  • Size

    14.4MB

  • MD5

    602b0df02ad09d34291aef9e9a8c7fc8

  • SHA1

    449153712c2bd177fd7ddbfed065eb730081cdc1

  • SHA256

    df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc

  • SHA512

    98e803b68551b49dbc23a3d9e05e4c94b57c407c1580a377a68fb5d6a0571d35184449cce6976a527c05b39eb0275881a28a73c463cf0872d9c6f042fc3dbe36

  • SSDEEP

    393216:rW1gSgpns/NIrRo0txyaIysVTof18S/PvWpiWJ96O:rNSgxrdXKa7v0FJUO

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe
    "C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\is-D16K1.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-D16K1.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp" /SL5="$6012A,14870178,58368,C:\Users\Admin\AppData\Local\Temp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.exe"
      2⤵
      • Executes dropped EXE
      PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-D16K1.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp

    Filesize

    706KB

    MD5

    a305877eabf2c8d30cd5df98345952ae

    SHA1

    c0518290145415e66f9f1b9a9c3c1b3e346a10fa

    SHA256

    8558efadf63fb12cf3ddacccfe07d397f2f902efadc4adf679a7e5c27cd49d76

    SHA512

    6f22868d451f3f07fdaa096b303a480fb9f5f9bd4675046bba79b9c15435892ea07b3ef5f3a3788144af696a675c2d4639ab4396e22761923c955747463b9fad

  • \Users\Admin\AppData\Local\Temp\is-D16K1.tmp\df4b7b09b65c9d90a42c15ffc967fd067494d3b61f15626ea5f710eaa24101bc.tmp

    Filesize

    706KB

    MD5

    a305877eabf2c8d30cd5df98345952ae

    SHA1

    c0518290145415e66f9f1b9a9c3c1b3e346a10fa

    SHA256

    8558efadf63fb12cf3ddacccfe07d397f2f902efadc4adf679a7e5c27cd49d76

    SHA512

    6f22868d451f3f07fdaa096b303a480fb9f5f9bd4675046bba79b9c15435892ea07b3ef5f3a3788144af696a675c2d4639ab4396e22761923c955747463b9fad

  • memory/1816-54-0x00000000756A1000-0x00000000756A3000-memory.dmp

    Filesize

    8KB

  • memory/1816-55-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1816-61-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1816-62-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB