Resubmissions

05-07-2023 04:25

230705-e15akaad95 7

05-07-2023 03:34

230705-d46r5aac76 7

Analysis

  • max time kernel
    392s
  • max time network
    396s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2023 04:25

General

  • Target

    42939fa34fca7408c344305201266c8eaf1c6bcfc0de8ca20b1861ee7e406d50.exe

  • Size

    1.9MB

  • MD5

    b13e91eb7897fa191bf408cb5975af33

  • SHA1

    34565fc58234198c224a234fddec4fcbc92714ff

  • SHA256

    42939fa34fca7408c344305201266c8eaf1c6bcfc0de8ca20b1861ee7e406d50

  • SHA512

    df5b670d8d075d3a370909809c161d650a731502b5648a09d14b14714cdc5fae3323aa16b594721331c437618d37e95784b790b75f4c28f1d99f9983708c6fcd

  • SSDEEP

    49152:2fWhNaBfJXAE3JorzzMw5czRO9lqPzSI1C5C:2fWhNaBfKEMMwyOL2zSI1C5C

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42939fa34fca7408c344305201266c8eaf1c6bcfc0de8ca20b1861ee7e406d50.exe
    "C:\Users\Admin\AppData\Local\Temp\42939fa34fca7408c344305201266c8eaf1c6bcfc0de8ca20b1861ee7e406d50.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /Y .\IjwFa3Hx.o
      2⤵
      • Loads dropped DLL
      PID:2404

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IjwFa3Hx.o

    Filesize

    1.2MB

    MD5

    ad82b732b20c4c04d203d80b1209b0bc

    SHA1

    ed5eb6ddd41f4f5b57184e82d986acaf0306e20a

    SHA256

    686b4009b4c0815f59f53ba79d401fe059f983acc6533fdd91ee78fc8e915288

    SHA512

    1d587061a211d76a8b85c2ea44fd16f1a758e8258604499ff33183d1cf9174802b1ec23c1202f8d749fce4f481ce720f73c69c389068987af5e8bde4bbe50723

  • \Users\Admin\AppData\Local\Temp\Ijwfa3Hx.o

    Filesize

    1.2MB

    MD5

    ad82b732b20c4c04d203d80b1209b0bc

    SHA1

    ed5eb6ddd41f4f5b57184e82d986acaf0306e20a

    SHA256

    686b4009b4c0815f59f53ba79d401fe059f983acc6533fdd91ee78fc8e915288

    SHA512

    1d587061a211d76a8b85c2ea44fd16f1a758e8258604499ff33183d1cf9174802b1ec23c1202f8d749fce4f481ce720f73c69c389068987af5e8bde4bbe50723

  • memory/2404-58-0x0000000002200000-0x0000000002337000-memory.dmp

    Filesize

    1.2MB

  • memory/2404-60-0x00000000000B0000-0x00000000000B6000-memory.dmp

    Filesize

    24KB

  • memory/2404-59-0x0000000002200000-0x0000000002337000-memory.dmp

    Filesize

    1.2MB

  • memory/2404-66-0x00000000025A0000-0x00000000026B0000-memory.dmp

    Filesize

    1.1MB

  • memory/2404-67-0x00000000026B0000-0x00000000027A7000-memory.dmp

    Filesize

    988KB

  • memory/2404-70-0x00000000026B0000-0x00000000027A7000-memory.dmp

    Filesize

    988KB

  • memory/2404-71-0x00000000026B0000-0x00000000027A7000-memory.dmp

    Filesize

    988KB