Analysis

  • max time kernel
    169s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:04

General

  • Target

    5ab1b3850e3fec00145fc6df6de8695d93274053bf2fd53e3a4b9f41ef4a10e8.exe

  • Size

    708KB

  • MD5

    cb72775bb64ed0c498e18b4e56f7f597

  • SHA1

    010e9ec9e60da615373f2367e3e0dc663761803f

  • SHA256

    5ab1b3850e3fec00145fc6df6de8695d93274053bf2fd53e3a4b9f41ef4a10e8

  • SHA512

    721eb6120262989e35458bc0d60ffea79952243e72a529c6fa9ddc703bd74fbd22f6a73ad467cc53d59020e976f4044455666786343c07a4bc35d9bb5964b952

  • SSDEEP

    12288:MMrEy901XhZ0dGhK7ZPpvK3EhedF4xUVM3DEqN7GjsQE4UQ7rMpASvnVwz:4yK0dG07nMgedeyM3rkDoAm6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ab1b3850e3fec00145fc6df6de8695d93274053bf2fd53e3a4b9f41ef4a10e8.exe
    "C:\Users\Admin\AppData\Local\Temp\5ab1b3850e3fec00145fc6df6de8695d93274053bf2fd53e3a4b9f41ef4a10e8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe

    Filesize

    416KB

    MD5

    734e765b4e967ecb94ed401740d1f34f

    SHA1

    4bdc70d273e3c6ba35bcd361dfce69d885b036ae

    SHA256

    0bf851ec1436869f3b145fd16b2e3f9fc3b2e75232df05dc8ec94d284e56b4e0

    SHA512

    a87027c58e743a7df0e62f4568245b137cf60cf0e4a8731522298ae9287e877ac3bf0c42da0c25d67e9e78d072c7e808eb5653f039fd7e1f0d26412650f9d536

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe

    Filesize

    416KB

    MD5

    734e765b4e967ecb94ed401740d1f34f

    SHA1

    4bdc70d273e3c6ba35bcd361dfce69d885b036ae

    SHA256

    0bf851ec1436869f3b145fd16b2e3f9fc3b2e75232df05dc8ec94d284e56b4e0

    SHA512

    a87027c58e743a7df0e62f4568245b137cf60cf0e4a8731522298ae9287e877ac3bf0c42da0c25d67e9e78d072c7e808eb5653f039fd7e1f0d26412650f9d536

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe

    Filesize

    136KB

    MD5

    23e36b8342c31b6be931821a7553cb20

    SHA1

    a1036f2cb221da4063a3ee94c38de6ca1ed7d713

    SHA256

    3fe1df7898f6fdf607f75083d9b130cf5299c29e30b53be3cc2f5035cc27bb93

    SHA512

    3b78d1ee3de1351a190da7675fe9a8277bb7927309e393dc479389f56ba20948417644992fd69c6d172fef92ca477412550799613b3303962133ed361b35b4ed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe

    Filesize

    136KB

    MD5

    23e36b8342c31b6be931821a7553cb20

    SHA1

    a1036f2cb221da4063a3ee94c38de6ca1ed7d713

    SHA256

    3fe1df7898f6fdf607f75083d9b130cf5299c29e30b53be3cc2f5035cc27bb93

    SHA512

    3b78d1ee3de1351a190da7675fe9a8277bb7927309e393dc479389f56ba20948417644992fd69c6d172fef92ca477412550799613b3303962133ed361b35b4ed

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe

    Filesize

    416KB

    MD5

    734e765b4e967ecb94ed401740d1f34f

    SHA1

    4bdc70d273e3c6ba35bcd361dfce69d885b036ae

    SHA256

    0bf851ec1436869f3b145fd16b2e3f9fc3b2e75232df05dc8ec94d284e56b4e0

    SHA512

    a87027c58e743a7df0e62f4568245b137cf60cf0e4a8731522298ae9287e877ac3bf0c42da0c25d67e9e78d072c7e808eb5653f039fd7e1f0d26412650f9d536

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5689210.exe

    Filesize

    416KB

    MD5

    734e765b4e967ecb94ed401740d1f34f

    SHA1

    4bdc70d273e3c6ba35bcd361dfce69d885b036ae

    SHA256

    0bf851ec1436869f3b145fd16b2e3f9fc3b2e75232df05dc8ec94d284e56b4e0

    SHA512

    a87027c58e743a7df0e62f4568245b137cf60cf0e4a8731522298ae9287e877ac3bf0c42da0c25d67e9e78d072c7e808eb5653f039fd7e1f0d26412650f9d536

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe

    Filesize

    136KB

    MD5

    23e36b8342c31b6be931821a7553cb20

    SHA1

    a1036f2cb221da4063a3ee94c38de6ca1ed7d713

    SHA256

    3fe1df7898f6fdf607f75083d9b130cf5299c29e30b53be3cc2f5035cc27bb93

    SHA512

    3b78d1ee3de1351a190da7675fe9a8277bb7927309e393dc479389f56ba20948417644992fd69c6d172fef92ca477412550799613b3303962133ed361b35b4ed

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g3227849.exe

    Filesize

    136KB

    MD5

    23e36b8342c31b6be931821a7553cb20

    SHA1

    a1036f2cb221da4063a3ee94c38de6ca1ed7d713

    SHA256

    3fe1df7898f6fdf607f75083d9b130cf5299c29e30b53be3cc2f5035cc27bb93

    SHA512

    3b78d1ee3de1351a190da7675fe9a8277bb7927309e393dc479389f56ba20948417644992fd69c6d172fef92ca477412550799613b3303962133ed361b35b4ed

  • memory/752-74-0x00000000000B0000-0x00000000000D8000-memory.dmp

    Filesize

    160KB

  • memory/752-75-0x0000000000330000-0x0000000000370000-memory.dmp

    Filesize

    256KB

  • memory/752-76-0x0000000000330000-0x0000000000370000-memory.dmp

    Filesize

    256KB