Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2023, 12:01

General

  • Target

    15968d8c85120cexe_JC.exe

  • Size

    414KB

  • MD5

    15968d8c85120c632304d185dba1eee9

  • SHA1

    63086c36b40dc0a5e9fbefc74df43715289c308d

  • SHA256

    68379bb80ab3d26dc43d27f2d51d16b3363011fd521a242b0302cba70f7cbe10

  • SHA512

    2044b83f22c2d856abe4a24c813959bece3542e1766611e20f1fe0bb92a39199ae219dd20817788ec61b826f9175965b01b2f518ed9d61ec8e04f3f97ec3c94e

  • SSDEEP

    12288:Wq4w/ekieZgU6sCucG1X7D3bu2OxGmGM/5Lelx:Wq4w/ekieH6s1jrby2ZU5Ler

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\79B2.tmp
      "C:\Users\Admin\AppData\Local\Temp\79B2.tmp" --helpC:\Users\Admin\AppData\Local\Temp\15968d8c85120cexe_JC.exe B9A3B89C07A83B2DD454CCD0E51FBEC55093ABEC84A478C4F1F83B2F87FF5A300E70556A7513C8DC8B8BC9EB56E98EB4F7FFC6BC37C89C7F8761F003BB7177E4
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\79B2.tmp

    Filesize

    414KB

    MD5

    651af2395773f5ba9f4e0094c286592d

    SHA1

    7a4f5166f061c73abed9758b2d2efb7d47283a6b

    SHA256

    47d971fa81cd05a337a343072558827854dbee64718599ade9d0af8bb471265e

    SHA512

    d12b414312169e59737f0a9e964b953f2b986973c8a12cbb14e1d76212a924432909a65709932835c2fd0791ed7be191048bf4503e6eaf85b2f4850a97da0f19

  • \Users\Admin\AppData\Local\Temp\79B2.tmp

    Filesize

    414KB

    MD5

    651af2395773f5ba9f4e0094c286592d

    SHA1

    7a4f5166f061c73abed9758b2d2efb7d47283a6b

    SHA256

    47d971fa81cd05a337a343072558827854dbee64718599ade9d0af8bb471265e

    SHA512

    d12b414312169e59737f0a9e964b953f2b986973c8a12cbb14e1d76212a924432909a65709932835c2fd0791ed7be191048bf4503e6eaf85b2f4850a97da0f19