Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2023 16:19

General

  • Target

    file.exe

  • Size

    1.4MB

  • MD5

    a749c50e50bea83a415298bf40d03217

  • SHA1

    066a179765249fa78765aa7c2ab063f7501d76be

  • SHA256

    7dedf613bef159a338fa71ae8e77e11899f9f5314ac3ebbb63c70d24537c3c73

  • SHA512

    55ebf9e07f9c828e17bbb68f7e4607f50c90b58f0f1910de51d2b2574ea32cea581138c1415405f004c6457d47cebb98b215be5af01d666f0d00f23da9c1ea0b

  • SSDEEP

    24576:JywNd7sZxBoGLHldxRjAQ7Vz1lhfqIFNRyaQW2RxyK0uX0IMVJ2Ay:8wX8xBfRHGmV7NMaQWw4sMyA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 268
                7⤵
                • Program crash
                PID:2660
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe

    Filesize

    1.3MB

    MD5

    f98b69ab7f60d3e64af2c247a5edec32

    SHA1

    0f1d5911e84d396c7a1b01945f75e41b00f5eb55

    SHA256

    e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec

    SHA512

    054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe

    Filesize

    1.3MB

    MD5

    f98b69ab7f60d3e64af2c247a5edec32

    SHA1

    0f1d5911e84d396c7a1b01945f75e41b00f5eb55

    SHA256

    e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec

    SHA512

    054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe

    Filesize

    947KB

    MD5

    32ffac3cd3bde991c46d0979d77c62c6

    SHA1

    17bd5348d742ea7d816071836e7bb9abbaeb2f8d

    SHA256

    d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6

    SHA512

    16226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe

    Filesize

    947KB

    MD5

    32ffac3cd3bde991c46d0979d77c62c6

    SHA1

    17bd5348d742ea7d816071836e7bb9abbaeb2f8d

    SHA256

    d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6

    SHA512

    16226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe

    Filesize

    542KB

    MD5

    a49e9c5431eee21f33803475caea2246

    SHA1

    fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c

    SHA256

    8a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d

    SHA512

    317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe

    Filesize

    542KB

    MD5

    a49e9c5431eee21f33803475caea2246

    SHA1

    fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c

    SHA256

    8a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d

    SHA512

    317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe

    Filesize

    1.3MB

    MD5

    f98b69ab7f60d3e64af2c247a5edec32

    SHA1

    0f1d5911e84d396c7a1b01945f75e41b00f5eb55

    SHA256

    e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec

    SHA512

    054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe

    Filesize

    1.3MB

    MD5

    f98b69ab7f60d3e64af2c247a5edec32

    SHA1

    0f1d5911e84d396c7a1b01945f75e41b00f5eb55

    SHA256

    e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec

    SHA512

    054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe

    Filesize

    947KB

    MD5

    32ffac3cd3bde991c46d0979d77c62c6

    SHA1

    17bd5348d742ea7d816071836e7bb9abbaeb2f8d

    SHA256

    d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6

    SHA512

    16226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe

    Filesize

    947KB

    MD5

    32ffac3cd3bde991c46d0979d77c62c6

    SHA1

    17bd5348d742ea7d816071836e7bb9abbaeb2f8d

    SHA256

    d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6

    SHA512

    16226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe

    Filesize

    542KB

    MD5

    a49e9c5431eee21f33803475caea2246

    SHA1

    fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c

    SHA256

    8a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d

    SHA512

    317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe

    Filesize

    542KB

    MD5

    a49e9c5431eee21f33803475caea2246

    SHA1

    fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c

    SHA256

    8a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d

    SHA512

    317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe

    Filesize

    1.0MB

    MD5

    c56d55f157eea7b4fdb488186c67387e

    SHA1

    bf155ed713277962773f4af2ce9be745a50b2cf8

    SHA256

    660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12

    SHA512

    bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164

  • memory/2776-46-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-50-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-43-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-44-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-48-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2776-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2776-45-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB