Analysis

  • max time kernel
    43s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2023 13:53

General

  • Target

    8223f2b8eb6a25685eab5c00c72e2578999cdc6eef046e87206781db23853143.exe

  • Size

    3.4MB

  • MD5

    6631e82f6138d05acb103a5ede11fdbf

  • SHA1

    70b2dd8542bf2ac6c6bc72316519a3394ae0d971

  • SHA256

    8223f2b8eb6a25685eab5c00c72e2578999cdc6eef046e87206781db23853143

  • SHA512

    470e9c59bb2fe1122139eb5b4d65c687d26fd5285b9cdf9a5ed27bebed94ec8649fb1abd81e2d953981a1140a445c6f370589bc104394f8ef166f2b7a0d40d04

  • SSDEEP

    98304:VLSNJcnt96agkKcR0t6mxv2MTn5lS6FT8RRfqjHte3:VWcqUR46mxeMTnS2Qfn

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8223f2b8eb6a25685eab5c00c72e2578999cdc6eef046e87206781db23853143.exe
    "C:\Users\Admin\AppData\Local\Temp\8223f2b8eb6a25685eab5c00c72e2578999cdc6eef046e87206781db23853143.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Eptryroq.dll,start
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:1984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

    Filesize

    48KB

    MD5

    343fa15c150a516b20cc9f787cfd530e

    SHA1

    369e8ac39d762e531d961c58b8c5dc84d19ba989

    SHA256

    d632e9dbacdcd8f6b86ba011ed6b23f961d104869654caa764216ea57a916524

    SHA512

    7726bd196cfee176f3d2002e30d353f991ffeafda90bac23d0b44c84c104aa263b0c78f390dd85833635667a3ca3863d2e8cd806dad5751f7984b2d34cafdc57

  • C:\Users\Admin\AppData\Local\Temp\Eptryroq.dll

    Filesize

    3.3MB

    MD5

    ee55677bf3644f0ea96bf369e7d4e382

    SHA1

    0854bdef1cf509dd01cc4ff5d68b6f34bb81a6e9

    SHA256

    4f9a4c342e5fbdb7d2d170beadf36108946f1b1a096396f051e4ac4c5411133d

    SHA512

    b7bb5c42d2083fd3918517533265b79996ed4e482aa86e2cacbe53ad31850c5d477d8fead3729b74101a81095b375057b2a34538c16bf38b1f72ca4e44da6dbf

  • C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20230220_225945413.html

    Filesize

    1.1MB

    MD5

    6fac122e3af8a6d89e1a589668f57740

    SHA1

    6ee11b6d84b8585dadfa97a1e81056741f3d200a

    SHA256

    4f598d890f1cc1dd86aaef64a2a7c172081d08fa3fc31d62e04494758899ca9f

    SHA512

    6645d5fe6efc26d252db9bd2ca07deb09bfac90ec45b12c31122c89cc722c401367c21911da055eb9ee967e34c9e0a8d862ebccb1a33b490cbaf62c045455ee7

  • C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1374.txt

    Filesize

    11KB

    MD5

    5b3e8518659745bed6ee2c89ce3a824a

    SHA1

    05e4993a792853287c988e29c6390fb179ce0b5f

    SHA256

    09a019810a6cfdf80f629d736c55225ff7605cb12484d6cf16b8f4a758a337ea

    SHA512

    9a388237ed517a322be321c1dd180303c31965aa7cbd88b1f4dc1b871fb5ad44c0987ca5ea27373ec2351b49fff9e0e1423218acc2c468c87e84980028fb8dea

  • C:\Users\Admin\AppData\Local\Temp\lpksetup-20230220-231216-0.log

    Filesize

    33KB

    MD5

    58b8177291c24a9da2ac6394e4e5157f

    SHA1

    03cfd1f3ab7c7d16f3a189876b14df37c7787193

    SHA256

    7cc0fc6087fabb77bef90c034456856e3dce6da597417e765c8cf773974f1f48

    SHA512

    88bfd8943301753f0efa9f6be7eddc101cc4c168dafa0d07b221f9407343a5152a277c1a97d11bc434a13ec5b2a7fff3846d69850f2ee15ad300774f81551e24

  • C:\Users\Admin\AppData\Local\Temp\lpksetup-20230220-232041-0.log

    Filesize

    35KB

    MD5

    ef47fec4f44f446fe2dcbe497a6c4c97

    SHA1

    58f727533e879b3e2e29cc7272ab9bd836df1fe0

    SHA256

    5b37df42e7e73e2757608b664883a3c05e2a86ffd0127703094f8240c6ca801b

    SHA512

    4549bde276aef788433b593d32a508adb18e5b27b0f1e88d639e887a8ef8b6fa06b96b7a25a94bc4ec5beb7d013eee7dad33776ae19e02f21adf44d26ea1d74c

  • \Users\Admin\AppData\Local\Temp\Eptryroq.dll

    Filesize

    3.3MB

    MD5

    ee55677bf3644f0ea96bf369e7d4e382

    SHA1

    0854bdef1cf509dd01cc4ff5d68b6f34bb81a6e9

    SHA256

    4f9a4c342e5fbdb7d2d170beadf36108946f1b1a096396f051e4ac4c5411133d

    SHA512

    b7bb5c42d2083fd3918517533265b79996ed4e482aa86e2cacbe53ad31850c5d477d8fead3729b74101a81095b375057b2a34538c16bf38b1f72ca4e44da6dbf

  • \Users\Admin\AppData\Local\Temp\Eptryroq.dll

    Filesize

    3.3MB

    MD5

    ee55677bf3644f0ea96bf369e7d4e382

    SHA1

    0854bdef1cf509dd01cc4ff5d68b6f34bb81a6e9

    SHA256

    4f9a4c342e5fbdb7d2d170beadf36108946f1b1a096396f051e4ac4c5411133d

    SHA512

    b7bb5c42d2083fd3918517533265b79996ed4e482aa86e2cacbe53ad31850c5d477d8fead3729b74101a81095b375057b2a34538c16bf38b1f72ca4e44da6dbf

  • \Users\Admin\AppData\Local\Temp\Eptryroq.dll

    Filesize

    3.3MB

    MD5

    ee55677bf3644f0ea96bf369e7d4e382

    SHA1

    0854bdef1cf509dd01cc4ff5d68b6f34bb81a6e9

    SHA256

    4f9a4c342e5fbdb7d2d170beadf36108946f1b1a096396f051e4ac4c5411133d

    SHA512

    b7bb5c42d2083fd3918517533265b79996ed4e482aa86e2cacbe53ad31850c5d477d8fead3729b74101a81095b375057b2a34538c16bf38b1f72ca4e44da6dbf

  • \Users\Admin\AppData\Local\Temp\Eptryroq.dll

    Filesize

    3.3MB

    MD5

    ee55677bf3644f0ea96bf369e7d4e382

    SHA1

    0854bdef1cf509dd01cc4ff5d68b6f34bb81a6e9

    SHA256

    4f9a4c342e5fbdb7d2d170beadf36108946f1b1a096396f051e4ac4c5411133d

    SHA512

    b7bb5c42d2083fd3918517533265b79996ed4e482aa86e2cacbe53ad31850c5d477d8fead3729b74101a81095b375057b2a34538c16bf38b1f72ca4e44da6dbf

  • memory/1776-57-0x0000000000400000-0x0000000000C35000-memory.dmp

    Filesize

    8.2MB

  • memory/1776-55-0x0000000002990000-0x0000000002EAB000-memory.dmp

    Filesize

    5.1MB

  • memory/1776-54-0x0000000002650000-0x0000000002984000-memory.dmp

    Filesize

    3.2MB

  • memory/1984-63-0x0000000002260000-0x00000000025BB000-memory.dmp

    Filesize

    3.4MB

  • memory/1984-83-0x0000000002260000-0x00000000025BB000-memory.dmp

    Filesize

    3.4MB

  • memory/1984-65-0x0000000002260000-0x00000000025BB000-memory.dmp

    Filesize

    3.4MB

  • memory/1984-64-0x00000000028A0000-0x00000000028A1000-memory.dmp

    Filesize

    4KB

  • memory/1984-132-0x0000000003340000-0x0000000003E82000-memory.dmp

    Filesize

    11.3MB

  • memory/1984-135-0x0000000002260000-0x00000000025BB000-memory.dmp

    Filesize

    3.4MB

  • memory/1984-133-0x0000000003340000-0x0000000003E82000-memory.dmp

    Filesize

    11.3MB

  • memory/1984-136-0x0000000003EA0000-0x0000000003EA1000-memory.dmp

    Filesize

    4KB

  • memory/1984-137-0x0000000003340000-0x0000000003E82000-memory.dmp

    Filesize

    11.3MB

  • memory/1984-138-0x0000000003340000-0x0000000003E82000-memory.dmp

    Filesize

    11.3MB

  • memory/1984-151-0x0000000002260000-0x00000000025BB000-memory.dmp

    Filesize

    3.4MB