Analysis

  • max time kernel
    149s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 20:44

General

  • Target

    1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe

  • Size

    376KB

  • MD5

    ae5976d5f9b72f7051595d62d92398dc

  • SHA1

    43ab360add906bc779d5e91edbaab23475182282

  • SHA256

    1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80

  • SHA512

    3dc417c7918d3f181b3b68d672ad8386e2dd3bf07922cd89023c0fc5850c334060b967f33a6e81085a56b70719d11235385fdd3bde785fa0d2304791dfb4950b

  • SSDEEP

    6144:KBy+bnr+rp0yN90QESM4WbXtTqmrGjc//WzHxrlDiOEl4w8MlwurTc:zMr3y90EMhcmrf/+z3D6lxle

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe
    "C:\Users\Admin\AppData\Local\Temp\1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe

    Filesize

    204KB

    MD5

    440b2d8c65e0500f5342e42ad93da66a

    SHA1

    4f9af29168fa8f12342629a91a2f2ad9110f5d04

    SHA256

    6ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d

    SHA512

    f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe

    Filesize

    204KB

    MD5

    440b2d8c65e0500f5342e42ad93da66a

    SHA1

    4f9af29168fa8f12342629a91a2f2ad9110f5d04

    SHA256

    6ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d

    SHA512

    f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe

    Filesize

    204KB

    MD5

    440b2d8c65e0500f5342e42ad93da66a

    SHA1

    4f9af29168fa8f12342629a91a2f2ad9110f5d04

    SHA256

    6ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d

    SHA512

    f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe

    Filesize

    204KB

    MD5

    440b2d8c65e0500f5342e42ad93da66a

    SHA1

    4f9af29168fa8f12342629a91a2f2ad9110f5d04

    SHA256

    6ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d

    SHA512

    f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe

    Filesize

    136KB

    MD5

    8f30f7f88229560306c5959c605316de

    SHA1

    36f26a905a9743f6dd1608e39b37d1116cafcc0a

    SHA256

    3a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7

    SHA512

    267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0

  • memory/544-74-0x0000000000B70000-0x0000000000B98000-memory.dmp

    Filesize

    160KB

  • memory/544-75-0x00000000070A0000-0x00000000070E0000-memory.dmp

    Filesize

    256KB

  • memory/544-76-0x00000000070A0000-0x00000000070E0000-memory.dmp

    Filesize

    256KB