Analysis

  • max time kernel
    129s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2023, 22:16

General

  • Target

    f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe

  • Size

    5KB

  • MD5

    45485e850a0a22a83861016a18ac711c

  • SHA1

    7e8b5266ae98b81db0d357da8ef87b0890dac181

  • SHA256

    f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7

  • SHA512

    6d59c5e7b42c81c437da1d4aebc7a544ca616b7dc566fe86e95e877cc9a08a419847c3585726f1c76cf13bbbfa15b4935b05a757be12e0093b83d0e21e7e8c95

  • SSDEEP

    48:6TTvtHhWXpBPIl6VSu7BX5VuTzuLhAs+VONLTrg7DYLGdfdN9orw2bWz:etHAXpnVSu7p5aOmfVOJTr62yor

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe
    "C:\Users\Admin\AppData\Local\Temp\f911f5a01f71d8f668054cb0ef12a5ef599cc4b9ce3269d43597a03182b88ec7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe
        C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe
            C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe
                C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2784
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2024
                  • C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe
                    C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe
                    9⤵
                    • Executes dropped EXE
                    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe

    Filesize

    5KB

    MD5

    1ce53e0321a35ca193ee50e6ef5c45d9

    SHA1

    d0b3b0e1e06729c5f27be349020fa5d612efe29b

    SHA256

    7ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b

    SHA512

    c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330

  • C:\Users\Admin\AppData\Local\Temp\20231011T010124_925.exe

    Filesize

    5KB

    MD5

    1ce53e0321a35ca193ee50e6ef5c45d9

    SHA1

    d0b3b0e1e06729c5f27be349020fa5d612efe29b

    SHA256

    7ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b

    SHA512

    c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330

  • C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe

    Filesize

    5KB

    MD5

    5709a4631d2b2833e24dd00e265e5403

    SHA1

    f31d80c223ca50f62a330bd43046f71bdd27550e

    SHA256

    3285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28

    SHA512

    f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0

  • C:\Users\Admin\AppData\Local\Temp\20231011T010210_805.exe

    Filesize

    5KB

    MD5

    5709a4631d2b2833e24dd00e265e5403

    SHA1

    f31d80c223ca50f62a330bd43046f71bdd27550e

    SHA256

    3285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28

    SHA512

    f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0

  • C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe

    Filesize

    5KB

    MD5

    1eaf94d0ad821cfa75c59cf442caa0eb

    SHA1

    c8e1c65cfb7cf53715c7cc264b165c782a7988a4

    SHA256

    ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8

    SHA512

    6c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3

  • C:\Users\Admin\AppData\Local\Temp\20231011T010246_045.exe

    Filesize

    5KB

    MD5

    1eaf94d0ad821cfa75c59cf442caa0eb

    SHA1

    c8e1c65cfb7cf53715c7cc264b165c782a7988a4

    SHA256

    ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8

    SHA512

    6c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3

  • C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe

    Filesize

    5KB

    MD5

    94c07014fa346d4ffc70690203e72e46

    SHA1

    9047945e5ade88718f8dfcbdca265e7e97ff5609

    SHA256

    4caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8

    SHA512

    6b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf

  • C:\Users\Admin\AppData\Local\Temp\20231011T010308_853.exe

    Filesize

    5KB

    MD5

    94c07014fa346d4ffc70690203e72e46

    SHA1

    9047945e5ade88718f8dfcbdca265e7e97ff5609

    SHA256

    4caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8

    SHA512

    6b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf

  • \Users\Admin\AppData\Local\Temp\20231011T010124_925.exe

    Filesize

    5KB

    MD5

    1ce53e0321a35ca193ee50e6ef5c45d9

    SHA1

    d0b3b0e1e06729c5f27be349020fa5d612efe29b

    SHA256

    7ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b

    SHA512

    c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330

  • \Users\Admin\AppData\Local\Temp\20231011T010124_925.exe

    Filesize

    5KB

    MD5

    1ce53e0321a35ca193ee50e6ef5c45d9

    SHA1

    d0b3b0e1e06729c5f27be349020fa5d612efe29b

    SHA256

    7ec8b273ce59682870c7d9ee9fb2f6720692af601b9ad03c2e88461f6ed3240b

    SHA512

    c5a9ecf526e092757dddaf86068228e76d9b2cc7529feeb4bef7245b499efdede327ea63c312eb0d551ace3a937841fbd6c3728ccfaa54fe95357444bb6fd330

  • \Users\Admin\AppData\Local\Temp\20231011T010210_805.exe

    Filesize

    5KB

    MD5

    5709a4631d2b2833e24dd00e265e5403

    SHA1

    f31d80c223ca50f62a330bd43046f71bdd27550e

    SHA256

    3285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28

    SHA512

    f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0

  • \Users\Admin\AppData\Local\Temp\20231011T010210_805.exe

    Filesize

    5KB

    MD5

    5709a4631d2b2833e24dd00e265e5403

    SHA1

    f31d80c223ca50f62a330bd43046f71bdd27550e

    SHA256

    3285a5eafa2fb05b1f06cad1ef40e8e1eebea0f8560cbd6f4b9eacc805f03f28

    SHA512

    f7c80e8ab4ec1f25f3220fa91b1efbcd5f08b94995a4404de004bc64eb189a2c4a1d2cdcf6e18ece401ed9aea4f502b6c39aa7488ecc0394ea9a75c9439b96f0

  • \Users\Admin\AppData\Local\Temp\20231011T010246_045.exe

    Filesize

    5KB

    MD5

    1eaf94d0ad821cfa75c59cf442caa0eb

    SHA1

    c8e1c65cfb7cf53715c7cc264b165c782a7988a4

    SHA256

    ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8

    SHA512

    6c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3

  • \Users\Admin\AppData\Local\Temp\20231011T010246_045.exe

    Filesize

    5KB

    MD5

    1eaf94d0ad821cfa75c59cf442caa0eb

    SHA1

    c8e1c65cfb7cf53715c7cc264b165c782a7988a4

    SHA256

    ae9f0f6d5fc8586f456c0acba789d635e2432dc16884c1a43c8cfe699f7d7aa8

    SHA512

    6c2d69e53be8955a97538995424087b390340bc31fc24185240f65e5004d7cff14e8168a9bdc48065b09ff800130e5c662cbe47d43b6516348183848a84834e3

  • \Users\Admin\AppData\Local\Temp\20231011T010308_853.exe

    Filesize

    5KB

    MD5

    94c07014fa346d4ffc70690203e72e46

    SHA1

    9047945e5ade88718f8dfcbdca265e7e97ff5609

    SHA256

    4caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8

    SHA512

    6b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf

  • \Users\Admin\AppData\Local\Temp\20231011T010308_853.exe

    Filesize

    5KB

    MD5

    94c07014fa346d4ffc70690203e72e46

    SHA1

    9047945e5ade88718f8dfcbdca265e7e97ff5609

    SHA256

    4caa636d13e2215608b4fe0ca1584bf20d066ae1ce762e430ca53f4070c1e7a8

    SHA512

    6b73254233a86ac5e3a6d63af10bd0da1fd6a07a3d4d9863229aaf068c6013535aceffa0e0a7554f301f0c76014deed37f354eec1789d17874cf1943fe673baf