Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:19

General

  • Target

    677904355fc406cd7d2fead8d5389574a5de4fe36b11cd0ffa87d7f9c9826de7.exe

  • Size

    1.3MB

  • MD5

    d41b88de50bd4f50b665906946f72c64

  • SHA1

    4dfd7bf8b4da376b0b212ff902ec18287300a5d7

  • SHA256

    677904355fc406cd7d2fead8d5389574a5de4fe36b11cd0ffa87d7f9c9826de7

  • SHA512

    39869a9b54362c325ec9af378f13f55489f7b3d894429321905a961286fcce5368cd1dd71e7104c39f5f7f37d41a51335796185c74a1de9d1e3753656b2cefd4

  • SSDEEP

    24576:nyknMrqbdKc3YDVK1jazj0Ft/1OWcyqh7NHxtsYtuEf1EwijI/FXIRV5B:ymYZSja3ytdOBn5NXTN+RV5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\677904355fc406cd7d2fead8d5389574a5de4fe36b11cd0ffa87d7f9c9826de7.exe
    "C:\Users\Admin\AppData\Local\Temp\677904355fc406cd7d2fead8d5389574a5de4fe36b11cd0ffa87d7f9c9826de7.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe

    Filesize

    1.2MB

    MD5

    b81b4772146279ba53451b3ca7ec719b

    SHA1

    d0e4b37f359ed9924ffa26f0824009f2c2b808df

    SHA256

    e7d5ceabf8e7dc2dda2c8d900a32bb6781b8cb96f7e28afd10ce376a00f96b93

    SHA512

    1e0863abd03e924f7edd3fb80254ca6e2b3996bfa11def780e7bf333608d23196cbd033991a4d991297109b992a73aabccf8718cd8bd9076736dccfff88ae6f6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe

    Filesize

    1.2MB

    MD5

    b81b4772146279ba53451b3ca7ec719b

    SHA1

    d0e4b37f359ed9924ffa26f0824009f2c2b808df

    SHA256

    e7d5ceabf8e7dc2dda2c8d900a32bb6781b8cb96f7e28afd10ce376a00f96b93

    SHA512

    1e0863abd03e924f7edd3fb80254ca6e2b3996bfa11def780e7bf333608d23196cbd033991a4d991297109b992a73aabccf8718cd8bd9076736dccfff88ae6f6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe

    Filesize

    738KB

    MD5

    92c752bfff717690379b17e0241dba5b

    SHA1

    605a22c59a10c3bbc243cee777f14069ae1ee690

    SHA256

    b713198cdf2f6ee241a65b9fdf9a82b398b70ae71416aa3f81c14ecacf0479f4

    SHA512

    0e5286c0efcb00dc08f22875a10a00169042e03921ebcef40ad4d0536a4cf462908136599642c40245be892e6056b2836acd7b42c4917cf1fb9b8974b5a47411

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe

    Filesize

    738KB

    MD5

    92c752bfff717690379b17e0241dba5b

    SHA1

    605a22c59a10c3bbc243cee777f14069ae1ee690

    SHA256

    b713198cdf2f6ee241a65b9fdf9a82b398b70ae71416aa3f81c14ecacf0479f4

    SHA512

    0e5286c0efcb00dc08f22875a10a00169042e03921ebcef40ad4d0536a4cf462908136599642c40245be892e6056b2836acd7b42c4917cf1fb9b8974b5a47411

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe

    Filesize

    555KB

    MD5

    ecc185a79d2d182fcf1cafa01f6425ed

    SHA1

    d635159d46f83e5bcd53644780d56ebd2e0b28f5

    SHA256

    67666fcc048488c29637fa7bab4da10c8c4efb1f88325debe90f32b7a5bd44ed

    SHA512

    508661a6aa856c7ac62e7f80f20f7b433d7b23650bc110763ac83bb3bb1d61e766761bfcee1b852601204eb469aeb28a3caf875ba819008e345a9b6ae45925c7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe

    Filesize

    555KB

    MD5

    ecc185a79d2d182fcf1cafa01f6425ed

    SHA1

    d635159d46f83e5bcd53644780d56ebd2e0b28f5

    SHA256

    67666fcc048488c29637fa7bab4da10c8c4efb1f88325debe90f32b7a5bd44ed

    SHA512

    508661a6aa856c7ac62e7f80f20f7b433d7b23650bc110763ac83bb3bb1d61e766761bfcee1b852601204eb469aeb28a3caf875ba819008e345a9b6ae45925c7

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe

    Filesize

    303KB

    MD5

    bf77596e47ab049b90f2b75c7a95fdc3

    SHA1

    7bccb2e0bdce45bc6d083a14ef0c66ccf2496a48

    SHA256

    6491d204e1298226e647ce67697942ef6c600523967f9a82eb51f93925561a94

    SHA512

    c8fdb68341481321f2e1415eaac47fadaeec51cf6f9f9df1ef8496cf06bc5376b37d9c53de2275b8a05d142dfa5e58b543cfb488ad8a5953f8d45e705d342132

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe

    Filesize

    303KB

    MD5

    bf77596e47ab049b90f2b75c7a95fdc3

    SHA1

    7bccb2e0bdce45bc6d083a14ef0c66ccf2496a48

    SHA256

    6491d204e1298226e647ce67697942ef6c600523967f9a82eb51f93925561a94

    SHA512

    c8fdb68341481321f2e1415eaac47fadaeec51cf6f9f9df1ef8496cf06bc5376b37d9c53de2275b8a05d142dfa5e58b543cfb488ad8a5953f8d45e705d342132

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe

    Filesize

    1.2MB

    MD5

    b81b4772146279ba53451b3ca7ec719b

    SHA1

    d0e4b37f359ed9924ffa26f0824009f2c2b808df

    SHA256

    e7d5ceabf8e7dc2dda2c8d900a32bb6781b8cb96f7e28afd10ce376a00f96b93

    SHA512

    1e0863abd03e924f7edd3fb80254ca6e2b3996bfa11def780e7bf333608d23196cbd033991a4d991297109b992a73aabccf8718cd8bd9076736dccfff88ae6f6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\za114155.exe

    Filesize

    1.2MB

    MD5

    b81b4772146279ba53451b3ca7ec719b

    SHA1

    d0e4b37f359ed9924ffa26f0824009f2c2b808df

    SHA256

    e7d5ceabf8e7dc2dda2c8d900a32bb6781b8cb96f7e28afd10ce376a00f96b93

    SHA512

    1e0863abd03e924f7edd3fb80254ca6e2b3996bfa11def780e7bf333608d23196cbd033991a4d991297109b992a73aabccf8718cd8bd9076736dccfff88ae6f6

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe

    Filesize

    738KB

    MD5

    92c752bfff717690379b17e0241dba5b

    SHA1

    605a22c59a10c3bbc243cee777f14069ae1ee690

    SHA256

    b713198cdf2f6ee241a65b9fdf9a82b398b70ae71416aa3f81c14ecacf0479f4

    SHA512

    0e5286c0efcb00dc08f22875a10a00169042e03921ebcef40ad4d0536a4cf462908136599642c40245be892e6056b2836acd7b42c4917cf1fb9b8974b5a47411

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\za812108.exe

    Filesize

    738KB

    MD5

    92c752bfff717690379b17e0241dba5b

    SHA1

    605a22c59a10c3bbc243cee777f14069ae1ee690

    SHA256

    b713198cdf2f6ee241a65b9fdf9a82b398b70ae71416aa3f81c14ecacf0479f4

    SHA512

    0e5286c0efcb00dc08f22875a10a00169042e03921ebcef40ad4d0536a4cf462908136599642c40245be892e6056b2836acd7b42c4917cf1fb9b8974b5a47411

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe

    Filesize

    555KB

    MD5

    ecc185a79d2d182fcf1cafa01f6425ed

    SHA1

    d635159d46f83e5bcd53644780d56ebd2e0b28f5

    SHA256

    67666fcc048488c29637fa7bab4da10c8c4efb1f88325debe90f32b7a5bd44ed

    SHA512

    508661a6aa856c7ac62e7f80f20f7b433d7b23650bc110763ac83bb3bb1d61e766761bfcee1b852601204eb469aeb28a3caf875ba819008e345a9b6ae45925c7

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\za685591.exe

    Filesize

    555KB

    MD5

    ecc185a79d2d182fcf1cafa01f6425ed

    SHA1

    d635159d46f83e5bcd53644780d56ebd2e0b28f5

    SHA256

    67666fcc048488c29637fa7bab4da10c8c4efb1f88325debe90f32b7a5bd44ed

    SHA512

    508661a6aa856c7ac62e7f80f20f7b433d7b23650bc110763ac83bb3bb1d61e766761bfcee1b852601204eb469aeb28a3caf875ba819008e345a9b6ae45925c7

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe

    Filesize

    303KB

    MD5

    bf77596e47ab049b90f2b75c7a95fdc3

    SHA1

    7bccb2e0bdce45bc6d083a14ef0c66ccf2496a48

    SHA256

    6491d204e1298226e647ce67697942ef6c600523967f9a82eb51f93925561a94

    SHA512

    c8fdb68341481321f2e1415eaac47fadaeec51cf6f9f9df1ef8496cf06bc5376b37d9c53de2275b8a05d142dfa5e58b543cfb488ad8a5953f8d45e705d342132

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\15170412.exe

    Filesize

    303KB

    MD5

    bf77596e47ab049b90f2b75c7a95fdc3

    SHA1

    7bccb2e0bdce45bc6d083a14ef0c66ccf2496a48

    SHA256

    6491d204e1298226e647ce67697942ef6c600523967f9a82eb51f93925561a94

    SHA512

    c8fdb68341481321f2e1415eaac47fadaeec51cf6f9f9df1ef8496cf06bc5376b37d9c53de2275b8a05d142dfa5e58b543cfb488ad8a5953f8d45e705d342132

  • memory/340-111-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-129-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-96-0x0000000004870000-0x00000000048B0000-memory.dmp

    Filesize

    256KB

  • memory/340-97-0x0000000004810000-0x0000000004866000-memory.dmp

    Filesize

    344KB

  • memory/340-98-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-99-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-101-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-103-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-105-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-107-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-94-0x00000000024A0000-0x00000000024F8000-memory.dmp

    Filesize

    352KB

  • memory/340-109-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-115-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-117-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-113-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-125-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-123-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-121-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-119-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-95-0x0000000004870000-0x00000000048B0000-memory.dmp

    Filesize

    256KB

  • memory/340-131-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-127-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-135-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-133-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-137-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-139-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-141-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-143-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-145-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-147-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-151-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-149-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-155-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-153-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-159-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-157-0x0000000004810000-0x0000000004861000-memory.dmp

    Filesize

    324KB

  • memory/340-161-0x0000000004870000-0x00000000048B0000-memory.dmp

    Filesize

    256KB