Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    17/09/2023, 11:21

General

  • Target

    60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe

  • Size

    14.3MB

  • MD5

    08e924314b73383707beb24a882dfe04

  • SHA1

    927c3b769c83880fb814213d564febed6b018d0c

  • SHA256

    60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573

  • SHA512

    c5845d7e2af478251c8237e57b6c673dd15e49d80937893f3d8e275414d16aad0213fd4457599d68a501c125507ac579edb68f3d5fb71920e2e6c247d05ed26e

  • SSDEEP

    196608:pBOt/rkLxhHyogA0ph4x/jfWnw49A6Gw8OdTJ3bZ4cpj8FEJZkQBHGvK74mpSd52:2t/r4xcDAx73wG+dX45iAMGvSppSd52

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe
    "C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp" /SL5="$7011E,14154793,732160,C:\Users\Admin\AppData\Local\Temp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2280

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp

          Filesize

          2.9MB

          MD5

          16b52379dd6c2c1ae7cc68eca146a5f4

          SHA1

          49cf93a8494ce9db49b4a6474a3d9adeb825665b

          SHA256

          b6caada601dee3bdbdf4b66f0471ec5ccd031ad8665b81333e04d4d9a7fd4b98

          SHA512

          4d5acd9a52e70de61afc0e93b7c850ae14afa5900170df7c05aa3ec802fd2c19bfec17b53ddebb13b81fbf7760360d2c028b537b55e05c5c70644b3579494055

        • \Users\Admin\AppData\Local\Temp\is-6MKPF.tmp\60d19b807f33f6b3f506d0402d099812f1358b74772468ab1e91e072245fe573.tmp

          Filesize

          2.9MB

          MD5

          16b52379dd6c2c1ae7cc68eca146a5f4

          SHA1

          49cf93a8494ce9db49b4a6474a3d9adeb825665b

          SHA256

          b6caada601dee3bdbdf4b66f0471ec5ccd031ad8665b81333e04d4d9a7fd4b98

          SHA512

          4d5acd9a52e70de61afc0e93b7c850ae14afa5900170df7c05aa3ec802fd2c19bfec17b53ddebb13b81fbf7760360d2c028b537b55e05c5c70644b3579494055

        • memory/2280-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2280-9-0x00000000021F0000-0x00000000021F1000-memory.dmp

          Filesize

          4KB

        • memory/2280-11-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2280-13-0x0000000000400000-0x00000000006FE000-memory.dmp

          Filesize

          3.0MB

        • memory/2280-14-0x00000000021F0000-0x00000000021F1000-memory.dmp

          Filesize

          4KB

        • memory/2412-1-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB

        • memory/2412-10-0x0000000000400000-0x00000000004C0000-memory.dmp

          Filesize

          768KB