Analysis

  • max time kernel
    141s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    02/07/2023, 01:25

General

  • Target

    file.exe

  • Size

    1.2MB

  • MD5

    21b8f99ca3832a204fd8d08065e1599e

  • SHA1

    6a5c3cb76b85e1323f9cb2f364f31cf6bb591a16

  • SHA256

    6fb4866ca3fa5e2e0c9926fee2fad2fc3324ef0177ff7b43e1f3990b05f4bd90

  • SHA512

    fc5aed584943ee053d843e1b325cf44d4811a84ec722dde13d82c790148d92874664c5e08d2c11bd866d902792047b60c25c06a1e1f48cb9b158c3119c309da6

  • SSDEEP

    24576:+fOyskQT9YsemOMi+XShulmLIrPfJL1rARpJjBBp/D:+GfkQT9YsVXQPLYPBJ2pvBp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Users\Admin\AppData\Local\Temp\is-3BUOF.tmp\is-S87DG.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3BUOF.tmp\is-S87DG.tmp" /SL4 $70122 "C:\Users\Admin\AppData\Local\Temp\file.exe" 1003063 136704
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1748

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\RehSpacer630\readme.txt

          Filesize

          4KB

          MD5

          ce494d2d223aed950fea67f657d3fa3e

          SHA1

          97a19c02487c41e3a079cd6764afffeb5e838b26

          SHA256

          c8fa111c5b9537e3b6cab9ba763e164e27fa469f2232b82a54b206a7d892b9e9

          SHA512

          687bf3bd7de28dc45ea622672dc59d7e45d9ce83530a7db6462447ea247a9bde061738c454e09b48531aab9cce802c8491aa730e4da65e63daf31c65ffc39fe1

        • C:\Users\Admin\AppData\Local\Temp\is-3BUOF.tmp\is-S87DG.tmp

          Filesize

          729KB

          MD5

          68bf4df1230cb1bc58336ef6350c5a74

          SHA1

          b551c8c301b63db439a6316af0d7d577434043ba

          SHA256

          410221a48dc0d2cc667c8d68ee819039be2ac515abc5f1beea0da1d68ec742ff

          SHA512

          52e9d08592d5c26b68644d1694ed2295f6edfb47c5db599b4b88d148668fda590c7ca7c779f97f417aa07c3019b9ab5d901a52838ce67cc95f873c092a451b10

        • C:\Users\Admin\AppData\Local\Temp\is-3BUOF.tmp\is-S87DG.tmp

          Filesize

          729KB

          MD5

          68bf4df1230cb1bc58336ef6350c5a74

          SHA1

          b551c8c301b63db439a6316af0d7d577434043ba

          SHA256

          410221a48dc0d2cc667c8d68ee819039be2ac515abc5f1beea0da1d68ec742ff

          SHA512

          52e9d08592d5c26b68644d1694ed2295f6edfb47c5db599b4b88d148668fda590c7ca7c779f97f417aa07c3019b9ab5d901a52838ce67cc95f873c092a451b10

        • \Users\Admin\AppData\Local\Temp\is-3BUOF.tmp\is-S87DG.tmp

          Filesize

          729KB

          MD5

          68bf4df1230cb1bc58336ef6350c5a74

          SHA1

          b551c8c301b63db439a6316af0d7d577434043ba

          SHA256

          410221a48dc0d2cc667c8d68ee819039be2ac515abc5f1beea0da1d68ec742ff

          SHA512

          52e9d08592d5c26b68644d1694ed2295f6edfb47c5db599b4b88d148668fda590c7ca7c779f97f417aa07c3019b9ab5d901a52838ce67cc95f873c092a451b10

        • \Users\Admin\AppData\Local\Temp\is-KOLCS.tmp\_isetup\_iscrypt.dll

          Filesize

          2KB

          MD5

          a69559718ab506675e907fe49deb71e9

          SHA1

          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

          SHA256

          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

          SHA512

          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

        • \Users\Admin\AppData\Local\Temp\is-KOLCS.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-KOLCS.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • memory/108-54-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/108-241-0x0000000000400000-0x0000000000428000-memory.dmp

          Filesize

          160KB

        • memory/1748-194-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/1748-242-0x0000000000400000-0x00000000004C6000-memory.dmp

          Filesize

          792KB