Analysis

  • max time kernel
    140s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2023, 21:16

General

  • Target

    3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe

  • Size

    376KB

  • MD5

    8b82dcd4258e70fe99cfc9017c97b67c

  • SHA1

    9b120a9cd65a9660cbea61782d0c9c7d180a3655

  • SHA256

    3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395

  • SHA512

    ef3e5c3006399e2a6c4bf3fb11afd3b04c1a5dbbb9e509b8854177230165aa81921fc9f3103dbd06b4c402aad40c86258daf8b8e97d6c908c909ef6be2ec6973

  • SSDEEP

    6144:K1y+bnr+fp0yN90QE7X7zbfzy+zH0tWKiamOdP/N967qtAbB+S1Ma6Vc+:7Mrry90h7fu+gEKiAk7qtAbYqMDVc+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe
    "C:\Users\Admin\AppData\Local\Temp\3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1712

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe

          Filesize

          204KB

          MD5

          b5a5b117d5aff7e8ae12f14d4d27d3fc

          SHA1

          db02da7fe049e213be127b2672e11524a76705a7

          SHA256

          fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12

          SHA512

          1fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe

          Filesize

          204KB

          MD5

          b5a5b117d5aff7e8ae12f14d4d27d3fc

          SHA1

          db02da7fe049e213be127b2672e11524a76705a7

          SHA256

          fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12

          SHA512

          1fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe

          Filesize

          204KB

          MD5

          b5a5b117d5aff7e8ae12f14d4d27d3fc

          SHA1

          db02da7fe049e213be127b2672e11524a76705a7

          SHA256

          fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12

          SHA512

          1fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe

          Filesize

          204KB

          MD5

          b5a5b117d5aff7e8ae12f14d4d27d3fc

          SHA1

          db02da7fe049e213be127b2672e11524a76705a7

          SHA256

          fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12

          SHA512

          1fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe

          Filesize

          136KB

          MD5

          8f30f7f88229560306c5959c605316de

          SHA1

          36f26a905a9743f6dd1608e39b37d1116cafcc0a

          SHA256

          3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

          SHA512

          267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

        • memory/1712-74-0x0000000000E50000-0x0000000000E78000-memory.dmp

          Filesize

          160KB

        • memory/1712-75-0x00000000070D0000-0x0000000007110000-memory.dmp

          Filesize

          256KB

        • memory/1712-76-0x00000000070D0000-0x0000000007110000-memory.dmp

          Filesize

          256KB