Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2023, 03:30

General

  • Target

    78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940.exe

  • Size

    12KB

  • MD5

    44ad16455efc3051fd00fe73e3bb7e40

  • SHA1

    198bd41511981e7307cc2513ce7030aa5b8e0c0d

  • SHA256

    78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940

  • SHA512

    09125cf385d4c0cbdf540d05114b1e7b018c950ff44b6cebe8d4e3ed3103bf08b41045a45597d84b63a2c3746ea21a8a15724017b61c02b0f9b116a9f277238d

  • SSDEEP

    192:5rfqZdzEvo1K2hhT4l1f3wyziSv3CIZcsDGl1Hh6FehNuyyCcxjJaAEJBjt:lyd4g1Kbl+2SIZcsDo1squy6xj4bb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940.exe
    "C:\Users\Admin\AppData\Local\Temp\78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940.exe"
    1⤵
      PID:832
    • C:\Users\Admin\AppData\Local\services.exe
      C:\Users\Admin\AppData\Local\services.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe
        2⤵
          PID:2736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 384
          2⤵
          • Loads dropped DLL
          • Program crash
          PID:2916

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\services.exe

        Filesize

        12KB

        MD5

        44ad16455efc3051fd00fe73e3bb7e40

        SHA1

        198bd41511981e7307cc2513ce7030aa5b8e0c0d

        SHA256

        78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940

        SHA512

        09125cf385d4c0cbdf540d05114b1e7b018c950ff44b6cebe8d4e3ed3103bf08b41045a45597d84b63a2c3746ea21a8a15724017b61c02b0f9b116a9f277238d

      • \Users\Admin\AppData\Local\services.exe

        Filesize

        12KB

        MD5

        44ad16455efc3051fd00fe73e3bb7e40

        SHA1

        198bd41511981e7307cc2513ce7030aa5b8e0c0d

        SHA256

        78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940

        SHA512

        09125cf385d4c0cbdf540d05114b1e7b018c950ff44b6cebe8d4e3ed3103bf08b41045a45597d84b63a2c3746ea21a8a15724017b61c02b0f9b116a9f277238d

      • \Users\Admin\AppData\Local\services.exe

        Filesize

        12KB

        MD5

        44ad16455efc3051fd00fe73e3bb7e40

        SHA1

        198bd41511981e7307cc2513ce7030aa5b8e0c0d

        SHA256

        78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940

        SHA512

        09125cf385d4c0cbdf540d05114b1e7b018c950ff44b6cebe8d4e3ed3103bf08b41045a45597d84b63a2c3746ea21a8a15724017b61c02b0f9b116a9f277238d

      • \Users\Admin\AppData\Local\services.exe

        Filesize

        12KB

        MD5

        44ad16455efc3051fd00fe73e3bb7e40

        SHA1

        198bd41511981e7307cc2513ce7030aa5b8e0c0d

        SHA256

        78f000c1901081a2b7f43e55843ba89b3ed2be2cab2c3c36f04c768800863940

        SHA512

        09125cf385d4c0cbdf540d05114b1e7b018c950ff44b6cebe8d4e3ed3103bf08b41045a45597d84b63a2c3746ea21a8a15724017b61c02b0f9b116a9f277238d