Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2023, 22:23

General

  • Target

    9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe

  • Size

    729KB

  • MD5

    c01631ea0bed87010ba5cd16cd04906d

  • SHA1

    fe953f5a5c68a2eeac43fab7ec6de0f2f1a7c57f

  • SHA256

    9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69

  • SHA512

    eea01adf55349f3cf8479a236d5c52a497c83e19757c2493d7e8db1915d3bb10b127921cd89c78c6999e882a1033bbf32d55192d6d267449cb9b0acb67646446

  • SSDEEP

    12288:G+BhHODYCNq5PFL3VldHxee67IwiWjV5VwzgNDxRihFCCJ:G+BhHOkCNq5lllZxb6ae/ogNNRihMCJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
    "C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe
      C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe --
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe

    Filesize

    729KB

    MD5

    1dceca134ad78a5cb1533c4fedda9e71

    SHA1

    fa699833de99c30bafe76bbbd849aeb8be13f293

    SHA256

    e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2

    SHA512

    9f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253

  • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe

    Filesize

    729KB

    MD5

    1dceca134ad78a5cb1533c4fedda9e71

    SHA1

    fa699833de99c30bafe76bbbd849aeb8be13f293

    SHA256

    e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2

    SHA512

    9f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253

  • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe

    Filesize

    729KB

    MD5

    a36dd4af2069eaed91c5a40f685e2f76

    SHA1

    fbf17226168d81c8cdc67c383265eae489699b29

    SHA256

    07f4cd044b23b311c6cd19b1429e4e6e5487c2e6844ad420d5d21558e663d866

    SHA512

    5fd3f6622249b6f7d128ae440722c997c83cf0709db0f2ce98ac751ee83b2db531cbc3843b831f24a855777d812e158c77fd65b7f091046dd4ed4ad89fe588f2

  • C:\Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe.bak

    Filesize

    729KB

    MD5

    6c97f8ec5712cdcbb1f7e04987da2cc3

    SHA1

    71a18260e6787f180516013f595af75ba0b2cfcc

    SHA256

    53e1e66486461b043c189889be10db673f600d4a40cf923775c54f268ca59de9

    SHA512

    046a065dc10ed87896765cde2983c33542696b1572a33ec3086cd7cae260a029fd2fa2830cb7a9ac7f4939cafc3d8ed1b009ee121af9f4a411243202ef879feb

  • \Users\Admin\AppData\Local\Temp\9c1c0bfaf5119a2b7c66dc9cb08b4e9f49fe2f884f675d164b261ed236857d69.exe

    Filesize

    729KB

    MD5

    1dceca134ad78a5cb1533c4fedda9e71

    SHA1

    fa699833de99c30bafe76bbbd849aeb8be13f293

    SHA256

    e6f4a8038e9f063841c7f1d165499372b2d96257e4274c348bda6228f1b1dcd2

    SHA512

    9f62edb25a0202939c823ea9ec064bb650677b0ad8ffd73de714864abb7b2b41649fc9962a81a525fcb939dac640c33280caeb63834fcdebedc5c14bb54fb253

  • memory/2200-12-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB