Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2023, 04:46

General

  • Target

    tmp.exe

  • Size

    3.9MB

  • MD5

    4b1939902232c11b9823d6c3d96c99be

  • SHA1

    d9c957c672a978251476385dba46e87bf13fce1a

  • SHA256

    c8ce5740a8d263c665e0a9117cab7dccf0961ec6cc4d765e7038e6de8f9c111a

  • SHA512

    de83412349c077f4569f4b16ee3c7fc7330a89afadfed540d6bc0da84cdf198da2fc8822a95b17868b4bd34c02b5e36774f16e6edec20d23cf167185bfa92ea2

  • SSDEEP

    98304:+JfC5u8dO+Nn10conAH3vd2PfevrAAG/tXWs:+mc+D0cc8WWvrXG/t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\new.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1036

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\new.exe

          Filesize

          4.4MB

          MD5

          ce3d3957f855b5d9cafd0a9aec446e46

          SHA1

          ac8a5ab1d86b9a4821bb8f8370d2d908a85764bf

          SHA256

          c540fbf92455e359c12e978f7c0da0c2ae18fb31cf83b51cf37a8f73968cc4cc

          SHA512

          e7f02aa06463c97048af089eef982b180d7d5f09f1ca3fa3fa74cf00f9d562ec280425e00f2a44b1ae07430d07d4a94d245eea1bef77d05c02040d1919b020a2

        • C:\Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\python310.dll

          Filesize

          4.3MB

          MD5

          e4533934b37e688106beac6c5919281e

          SHA1

          ada39f10ef0bbdcf05822f4260e43d53367b0017

          SHA256

          2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

          SHA512

          fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9

        • \Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\new.exe

          Filesize

          4.4MB

          MD5

          ce3d3957f855b5d9cafd0a9aec446e46

          SHA1

          ac8a5ab1d86b9a4821bb8f8370d2d908a85764bf

          SHA256

          c540fbf92455e359c12e978f7c0da0c2ae18fb31cf83b51cf37a8f73968cc4cc

          SHA512

          e7f02aa06463c97048af089eef982b180d7d5f09f1ca3fa3fa74cf00f9d562ec280425e00f2a44b1ae07430d07d4a94d245eea1bef77d05c02040d1919b020a2

        • \Users\Admin\AppData\Local\Temp\onefile_844_133323147784130000\python310.dll

          Filesize

          4.3MB

          MD5

          e4533934b37e688106beac6c5919281e

          SHA1

          ada39f10ef0bbdcf05822f4260e43d53367b0017

          SHA256

          2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

          SHA512

          fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9