Analysis

  • max time kernel
    147s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2023 07:54

General

  • Target

    File.exe

  • Size

    655.0MB

  • MD5

    4eb9b0f0903b77be9247978ffbc8814f

  • SHA1

    ea21fa7fd9a430a899a67136b6f864bbd6ea74b9

  • SHA256

    ba88907898f51ddf30595e773cd5de0f28020ad70af49e530c89b20501bc0f94

  • SHA512

    fec3dec02889784e2aa6e82f64f85e397ce44812287312809081e299aca960ac03cc23dbccc43e72c621a05b80de1a6bbce04003d0538708e9a45fe5d74e8a1f

  • SSDEEP

    98304:Jkfy48U0RHYuMH+F4mMURdns7gefj/vIeZuNYq8CIF+k/SL7IwXdz:Jka4t0/s7gefrvENhuwaSYU

Score
10/10

Malware Config

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\File.exe
    "C:\Users\Admin\AppData\Local\Temp\File.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:928
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 988
      2⤵
      • Program crash
      PID:1936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/928-54-0x0000000000400000-0x0000000000EB6000-memory.dmp
    Filesize

    10.7MB

  • memory/928-56-0x0000000000400000-0x0000000000EB6000-memory.dmp
    Filesize

    10.7MB

  • memory/928-57-0x0000000000400000-0x0000000000EB6000-memory.dmp
    Filesize

    10.7MB

  • memory/928-67-0x0000000000400000-0x0000000000EB6000-memory.dmp
    Filesize

    10.7MB