Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 10:30

General

  • Target

    file.exe

  • Size

    5.3MB

  • MD5

    f0ba8b6ab407e8c0c70f78d5f7cf14a1

  • SHA1

    3c566fa61b629b4eaaebb2100a017c732d213066

  • SHA256

    bba88bee0d55a24aa33fba3a65c28a1e4acad47c8f8320fa621e4a09756efed0

  • SHA512

    b48c91298bfde40670ab1866bc8c689ca89781163f6fe459208ca9e7ed64a845582a461ca2a7c68d1eb96f006f2b94b46fcc64e7e6b96945764a5364faabe305

  • SSDEEP

    98304:MkLsS2ySliRp2gyQUnIM6X/JM4ANgS9+pQ1f/PzWZQih0sEjFh:rR2ySlVdNo/JM52woQ1f/rWZQicjFh

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\is-BRGOP.tmp\file.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BRGOP.tmp\file.tmp" /SL5="$80124,4692410,832512,C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1168

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-BRGOP.tmp\file.tmp

    Filesize

    3.1MB

    MD5

    bd8bf925f0a545813fdb0874d8761fa8

    SHA1

    35be8a9479646e88b9b9afdfc91e6f5eb55b5917

    SHA256

    c7351975b2dcbc5780204c188a681893593e70337507defbc052df7e3125d33a

    SHA512

    b54c87485d428a8d4c7dcb9e5bee31ff94e863ad429539387f60a1f4fc0e67080ee10d82edab69033c2842cfd0f8f9e4d16332b4d1810389d44c8960fe703df9

  • \Users\Admin\AppData\Local\Temp\is-BRGOP.tmp\file.tmp

    Filesize

    3.1MB

    MD5

    bd8bf925f0a545813fdb0874d8761fa8

    SHA1

    35be8a9479646e88b9b9afdfc91e6f5eb55b5917

    SHA256

    c7351975b2dcbc5780204c188a681893593e70337507defbc052df7e3125d33a

    SHA512

    b54c87485d428a8d4c7dcb9e5bee31ff94e863ad429539387f60a1f4fc0e67080ee10d82edab69033c2842cfd0f8f9e4d16332b4d1810389d44c8960fe703df9

  • memory/1168-61-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/1168-64-0x0000000000400000-0x000000000071C000-memory.dmp

    Filesize

    3.1MB

  • memory/1168-65-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/2576-54-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2576-63-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB