Resubmissions

21/04/2023, 08:12

230421-j3s3jaeg58 7

21/04/2023, 07:12

230421-h1vynsef46 7

Analysis

  • max time kernel
    37s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 07:12

General

  • Target

    c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe

  • Size

    1.6MB

  • MD5

    ffdcae3b31803a83e3818714d343a975

  • SHA1

    b52678a98201be08c5ce65c181a56f1959c8698c

  • SHA256

    c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3

  • SHA512

    e1ae4c98ccdbfe9dd2d234bda77c3098992512fcebb4e4e275e71359925ab5ac5bb11a52cd6d30903b3b910d962c967bda03e2eb40d73dfef7ff9d4c5e2e86bc

  • SSDEEP

    24576:s7FUDowAyrTVE3U5F/8QD9Kic6QL3E2vVsjECUAQT45deRV9R4:sBuZrEUd5KIy029s4C1eH9W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe
    "C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp" /SL5="$90122,832512,832512,C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp

    Filesize

    3.1MB

    MD5

    9b2231506b2a97692f6b9683460880a0

    SHA1

    226f72dcea4f8c3bfb0bb3dec4e63c2725170568

    SHA256

    b1b015f3762b4b9bfce928401a3b13beee5fb70c989b97a03d57545fc00a1978

    SHA512

    1b5be819d361fd2321b4407f1d5e56123b497848e2dfd337783b30fb9ab3c0f6a2abd7cb6ed03e3abf886ae47d76134f8d3f1f5b1de57056c6d8901dae533546

  • \Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp

    Filesize

    3.1MB

    MD5

    9b2231506b2a97692f6b9683460880a0

    SHA1

    226f72dcea4f8c3bfb0bb3dec4e63c2725170568

    SHA256

    b1b015f3762b4b9bfce928401a3b13beee5fb70c989b97a03d57545fc00a1978

    SHA512

    1b5be819d361fd2321b4407f1d5e56123b497848e2dfd337783b30fb9ab3c0f6a2abd7cb6ed03e3abf886ae47d76134f8d3f1f5b1de57056c6d8901dae533546

  • memory/292-62-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/292-64-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/292-65-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/292-69-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/292-71-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1552-54-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1552-63-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/1552-73-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB