Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 22:27

General

  • Target

    6ee58be9c45d2dde9b0ed9cf3839a3b2b42b98aaac5b6f0b1d959102abea6143.exe

  • Size

    376KB

  • MD5

    86ad5363b07a531e067e7e25de8649c3

  • SHA1

    a06a63656ee4cac53bdb96b2c69290d14e78caa7

  • SHA256

    6ee58be9c45d2dde9b0ed9cf3839a3b2b42b98aaac5b6f0b1d959102abea6143

  • SHA512

    c79a94400167d9421e051a06f7270f9b8f019933aeab5953e6ced545c90140ba471ed1b53556b9d6ae13737f9d653d59d059dd02cda9748ce05b3a21a5143bae

  • SSDEEP

    6144:Kcy+bnr+ip0yN90QEwjInOtgSjORlfqXWLdy2a0CRDAO8MHIaqIWn0UnZKL1Fp7T:0MrWy902j5tLZXMyIeD5Fen0UnM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ee58be9c45d2dde9b0ed9cf3839a3b2b42b98aaac5b6f0b1d959102abea6143.exe
    "C:\Users\Admin\AppData\Local\Temp\6ee58be9c45d2dde9b0ed9cf3839a3b2b42b98aaac5b6f0b1d959102abea6143.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:660

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe

          Filesize

          204KB

          MD5

          85ee37c563b723dafe467d127b174036

          SHA1

          bceac5dbc4d7f34f3eb650b487143721ed76e619

          SHA256

          35e929f092fd8a1d1a23364c9b405f0fe9ee6c4f3cf78a05269472c2c930a1c2

          SHA512

          0a7c9506f847d27d215a03270764fd7427ef9803d57517d125996eeec1b157192c577744b2d1471c1102b89a2372763501494d616fa3026398409b6b46853ef4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe

          Filesize

          204KB

          MD5

          85ee37c563b723dafe467d127b174036

          SHA1

          bceac5dbc4d7f34f3eb650b487143721ed76e619

          SHA256

          35e929f092fd8a1d1a23364c9b405f0fe9ee6c4f3cf78a05269472c2c930a1c2

          SHA512

          0a7c9506f847d27d215a03270764fd7427ef9803d57517d125996eeec1b157192c577744b2d1471c1102b89a2372763501494d616fa3026398409b6b46853ef4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe

          Filesize

          204KB

          MD5

          85ee37c563b723dafe467d127b174036

          SHA1

          bceac5dbc4d7f34f3eb650b487143721ed76e619

          SHA256

          35e929f092fd8a1d1a23364c9b405f0fe9ee6c4f3cf78a05269472c2c930a1c2

          SHA512

          0a7c9506f847d27d215a03270764fd7427ef9803d57517d125996eeec1b157192c577744b2d1471c1102b89a2372763501494d616fa3026398409b6b46853ef4

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0046453.exe

          Filesize

          204KB

          MD5

          85ee37c563b723dafe467d127b174036

          SHA1

          bceac5dbc4d7f34f3eb650b487143721ed76e619

          SHA256

          35e929f092fd8a1d1a23364c9b405f0fe9ee6c4f3cf78a05269472c2c930a1c2

          SHA512

          0a7c9506f847d27d215a03270764fd7427ef9803d57517d125996eeec1b157192c577744b2d1471c1102b89a2372763501494d616fa3026398409b6b46853ef4

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g1082125.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • memory/660-74-0x0000000000F80000-0x0000000000FA8000-memory.dmp

          Filesize

          160KB

        • memory/660-75-0x0000000000EB0000-0x0000000000EF0000-memory.dmp

          Filesize

          256KB

        • memory/660-76-0x0000000000EB0000-0x0000000000EF0000-memory.dmp

          Filesize

          256KB