Analysis

  • max time kernel
    128s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2023, 22:10

General

  • Target

    MegaHack v5.4 SETUP.exe

  • Size

    14.6MB

  • MD5

    21f8588ba383393390d76ca642d73183

  • SHA1

    292d500d0ab46c701b33a93284e99a5144078be6

  • SHA256

    85f9e216a24dd777f8e4b7db008128d402355eb93a316fa6ba6c6d8392720a19

  • SHA512

    6426425fcf4ca0ae1ebfbc5b1b91f86a4b9a1bb7a9dc1f648879d3f810c1e5a36d0f3b56effe1f204d0e1847eb93b0ca00fd7c5c2899a8097268f9eddfcbcbd0

  • SSDEEP

    393216:mEGDkj4i79yFTB3HWNmHrjAbh6pBKzd25iFsmF5cISZH:mnA/EFTB3RHyzQxmF5C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe
    "C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp" /SL5="$70126,15016215,57856,C:\Users\Admin\AppData\Local\Temp\MegaHack v5.4 SETUP.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:1196

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Mega Hack\is-AHTP0.tmp

          Filesize

          232KB

          MD5

          ca8b5dba03f3a1ecc3901d156251f590

          SHA1

          dda8a51fe14e793cd1498bff2b0f07f029f6b7c4

          SHA256

          d63e28c5ddd74b71f7b2c897f7d373779ac5d2ecb7476b373ddec179ba42cc05

          SHA512

          bd17cb2c0ceac093fa54a7e15d17e87d440550540a9dd3915498f0dfac82474e59247ea5a2d9b4a4d2020f83455a0cd24149694b979699a22f0d106c65ef260f

        • C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp

          Filesize

          697KB

          MD5

          832dab307e54aa08f4b6cdd9b9720361

          SHA1

          ebd007fb7482040ecf34339e4bf917209c1018df

          SHA256

          cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

          SHA512

          358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

        • C:\Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp

          Filesize

          697KB

          MD5

          832dab307e54aa08f4b6cdd9b9720361

          SHA1

          ebd007fb7482040ecf34339e4bf917209c1018df

          SHA256

          cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

          SHA512

          358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

        • \Users\Admin\AppData\Local\Temp\is-UBO4Q.tmp\MegaHack v5.4 SETUP.tmp

          Filesize

          697KB

          MD5

          832dab307e54aa08f4b6cdd9b9720361

          SHA1

          ebd007fb7482040ecf34339e4bf917209c1018df

          SHA256

          cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

          SHA512

          358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

        • memory/1196-116-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-64-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-66-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-62-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/1196-96-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-101-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-111-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-129-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-138-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/1196-152-0x0000000000400000-0x00000000004BE000-memory.dmp

          Filesize

          760KB

        • memory/2024-63-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2024-54-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2024-153-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB