Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 17:45

General

  • Target

    97446377168211exeexeexeex.exe

  • Size

    31KB

  • MD5

    9744637716821173b405ccf700e4425f

  • SHA1

    c59394c41bc9060b4e899ead1dc0c32016884d8a

  • SHA256

    36a31af3fbee43522fbf6a4aea740de46e1645133add8918bf1f31e98208f04b

  • SHA512

    f37b51a7cc81b56a477435201c2093cd22845e97a01897797a85e0ffd8f6dfc9f9aaee6872c3693417fa3071197172c9554a381217814ea8a857f2d522c4b0e3

  • SSDEEP

    384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpju3FXobM:bAvJCYOOvbRPDEgXVFzpC3FXog

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\demka.exe
      "C:\Users\Admin\AppData\Local\Temp\demka.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    fbec228140bd2fa1c21a646918e9029e

    SHA1

    a047128207be40065113a2933f5c79c13b65ab5e

    SHA256

    1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

    SHA512

    775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

  • C:\Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    fbec228140bd2fa1c21a646918e9029e

    SHA1

    a047128207be40065113a2933f5c79c13b65ab5e

    SHA256

    1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

    SHA512

    775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

  • \Users\Admin\AppData\Local\Temp\demka.exe

    Filesize

    31KB

    MD5

    fbec228140bd2fa1c21a646918e9029e

    SHA1

    a047128207be40065113a2933f5c79c13b65ab5e

    SHA256

    1cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c

    SHA512

    775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f

  • memory/2336-54-0x00000000002A0000-0x00000000002A6000-memory.dmp

    Filesize

    24KB

  • memory/2336-55-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB