Analysis

  • max time kernel
    145s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 14:35

General

  • Target

    ea0548ff7fce715749d06e5b01f434537d85fad2f3d7d89038e3f744660365ae.exe

  • Size

    2.7MB

  • MD5

    60ef46f62c3b27f0ed5d812ba6598ef4

  • SHA1

    48e4812f68c694f28a04199950a35071638d56f0

  • SHA256

    ea0548ff7fce715749d06e5b01f434537d85fad2f3d7d89038e3f744660365ae

  • SHA512

    a1a2c7e27b758d43579c0528aa3e010531bbbd1a2a0c0857c9e596767e7346a806689cb8437529c235b24742fc2d4d145b1d93d3d086794e264ea3d0756249f8

  • SSDEEP

    49152:XnIZAylZG56uAltDeNNYUgnSbhidCFA7Wygu/APqPBboCupnFFIfY:XIvvGdAzyNNYTnyidCe7WDCAyPZduFFf

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0548ff7fce715749d06e5b01f434537d85fad2f3d7d89038e3f744660365ae.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0548ff7fce715749d06e5b01f434537d85fad2f3d7d89038e3f744660365ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:1968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll

    Filesize

    3.2MB

    MD5

    86cfece8978be549b2bb99392919dff2

    SHA1

    73fd2f9855f2fa12c975b14c24ac070b2401a309

    SHA256

    e7f8ee8e07209857469642d10672fb29a82bed3dac9f2448f31e54e31d1ce1e1

    SHA512

    ede818a4330e98df49e819f8d623500d4084f7e97f9347c337c524b1156543c34afbd6ba812fa81274b36ebd08a66dd787c99451c1ddcabf172584aa5e5f2fd4

  • \Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll

    Filesize

    3.2MB

    MD5

    86cfece8978be549b2bb99392919dff2

    SHA1

    73fd2f9855f2fa12c975b14c24ac070b2401a309

    SHA256

    e7f8ee8e07209857469642d10672fb29a82bed3dac9f2448f31e54e31d1ce1e1

    SHA512

    ede818a4330e98df49e819f8d623500d4084f7e97f9347c337c524b1156543c34afbd6ba812fa81274b36ebd08a66dd787c99451c1ddcabf172584aa5e5f2fd4

  • \Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll

    Filesize

    3.2MB

    MD5

    86cfece8978be549b2bb99392919dff2

    SHA1

    73fd2f9855f2fa12c975b14c24ac070b2401a309

    SHA256

    e7f8ee8e07209857469642d10672fb29a82bed3dac9f2448f31e54e31d1ce1e1

    SHA512

    ede818a4330e98df49e819f8d623500d4084f7e97f9347c337c524b1156543c34afbd6ba812fa81274b36ebd08a66dd787c99451c1ddcabf172584aa5e5f2fd4

  • \Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll

    Filesize

    3.2MB

    MD5

    86cfece8978be549b2bb99392919dff2

    SHA1

    73fd2f9855f2fa12c975b14c24ac070b2401a309

    SHA256

    e7f8ee8e07209857469642d10672fb29a82bed3dac9f2448f31e54e31d1ce1e1

    SHA512

    ede818a4330e98df49e819f8d623500d4084f7e97f9347c337c524b1156543c34afbd6ba812fa81274b36ebd08a66dd787c99451c1ddcabf172584aa5e5f2fd4

  • \Users\Admin\AppData\Local\Temp\Wtoahoepfise.dll

    Filesize

    3.2MB

    MD5

    86cfece8978be549b2bb99392919dff2

    SHA1

    73fd2f9855f2fa12c975b14c24ac070b2401a309

    SHA256

    e7f8ee8e07209857469642d10672fb29a82bed3dac9f2448f31e54e31d1ce1e1

    SHA512

    ede818a4330e98df49e819f8d623500d4084f7e97f9347c337c524b1156543c34afbd6ba812fa81274b36ebd08a66dd787c99451c1ddcabf172584aa5e5f2fd4

  • memory/1968-65-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-68-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-78-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-77-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-64-0x0000000000E60000-0x0000000000E61000-memory.dmp

    Filesize

    4KB

  • memory/1968-75-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-67-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-63-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-70-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-71-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-72-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-73-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/1968-74-0x00000000009C0000-0x0000000000D09000-memory.dmp

    Filesize

    3.3MB

  • memory/2012-54-0x00000000048A0000-0x0000000004B14000-memory.dmp

    Filesize

    2.5MB

  • memory/2012-55-0x0000000004B20000-0x0000000004E5F000-memory.dmp

    Filesize

    3.2MB

  • memory/2012-57-0x0000000000400000-0x0000000002D57000-memory.dmp

    Filesize

    41.3MB