Analysis

  • max time kernel
    142s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:43

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    714253bb012b77ceb9ea902080498760

  • SHA1

    d0464c5c39b42443de81fb1f78317ce794d76282

  • SHA256

    80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e

  • SHA512

    5d0b6792aab9ce81bcd2e2dc06da76663f29662be3975efdb75f1154aaa49b36b32799fd882da06d9d98a247e77f16b90dcded93a43866127a2531b529c2bef2

  • SSDEEP

    12288:2Mr7y904Q6qeczmnoVXANKCp2+9DMpcAbr2fnFfNf1cuudyO6aasQ2:lyHQ/ecVVXAcCGv2fFf9+um/6aa+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • memory/1260-82-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-92-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-80-0x0000000000DD0000-0x0000000000DE8000-memory.dmp
    Filesize

    96KB

  • memory/1260-81-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-78-0x00000000002E0000-0x000000000030D000-memory.dmp
    Filesize

    180KB

  • memory/1260-84-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-86-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-88-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-90-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-79-0x0000000000790000-0x00000000007AA000-memory.dmp
    Filesize

    104KB

  • memory/1260-94-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-96-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-98-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-100-0x0000000000DD0000-0x0000000000DE2000-memory.dmp
    Filesize

    72KB

  • memory/1260-102-0x0000000000E20000-0x0000000000E60000-memory.dmp
    Filesize

    256KB

  • memory/1260-103-0x0000000000E20000-0x0000000000E60000-memory.dmp
    Filesize

    256KB

  • memory/1260-104-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1260-105-0x0000000000E20000-0x0000000000E60000-memory.dmp
    Filesize

    256KB