Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 22:29

General

  • Target

    7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe

  • Size

    1.2MB

  • MD5

    6b167374f39264956880174343f2be39

  • SHA1

    35b12f9c031bff55c33589a073b056bae802a9d8

  • SHA256

    7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096

  • SHA512

    f554b1f53a4ae6d7cd6534dde0d55135713279a0d1cb7b48c9ec7dc4840c2acb8f223ed2e483d12ce4e4d20b3522408a478d31d00fe3d5fd872baf1631b9dd9b

  • SSDEEP

    24576:KylXbAIQv4U/wVB1e863bh1UsYXlesp389DdC65YyK7+Fqoi93MiVHv:RlXbuiU863gVesd8VdCEK7+Fq9MO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
    "C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:880

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe

    Filesize

    919KB

    MD5

    fa3cd90e07be166f52e4199804cb51b4

    SHA1

    0441d5aded08ce8515fa51eb889193b6b16fc977

    SHA256

    e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727

    SHA512

    255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe

    Filesize

    420KB

    MD5

    fd494c79b7faedf40bd5861a7869e27a

    SHA1

    99015a410f7644b56f40014dfd95234ba77d2a24

    SHA256

    1f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383

    SHA512

    d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe

    Filesize

    136KB

    MD5

    dc26c0865ef6c13f8096d8c353e95f3e

    SHA1

    8e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05

    SHA256

    4477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d

    SHA512

    5e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264

  • memory/880-84-0x0000000000BE0000-0x0000000000C08000-memory.dmp

    Filesize

    160KB

  • memory/880-85-0x00000000023D0000-0x0000000002410000-memory.dmp

    Filesize

    256KB

  • memory/880-86-0x00000000023D0000-0x0000000002410000-memory.dmp

    Filesize

    256KB