Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:04

General

  • Target

    ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe

  • Size

    5KB

  • MD5

    1ffec3a89c49bebcef21a5334f126ecf

  • SHA1

    0a9f151feec42a8a63d63f75b6b6d26fd53f9cc4

  • SHA256

    ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f

  • SHA512

    c28e4eb39b020555eab5a1bdc26163e08156a78d5105991f036ac0a15dd6d875808b020d533c928367cdf3afa50d165700bd865712d68b9609ead52ec4b004e0

  • SSDEEP

    96:VvtHdXgTvetmwQdwrOD7TrBxzBIaorDPPp:fdXKetmIrODBIaorDPPp

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe
    "C:\Users\Admin\AppData\Local\Temp\ed54e1e3a038f76a2e65cd83d73cebff5ffcd358c3c179795c716b6c380d9d2f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2612
      • C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe
        C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe
            C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:532
              • C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe
                C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1740
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:864
                  • C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe
                    C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:312
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe
                      10⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1348
                      • C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe
                        C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of WriteProcessMemory
                        PID:1988
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe
                          12⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:1324
                          • C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe
                            C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe
                            13⤵
                            • Executes dropped EXE
                            PID:2384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe

    Filesize

    5KB

    MD5

    2e412d7565cfa3515ff03b433620c97c

    SHA1

    fbffcee7f5bc7abc556d18c978e1d4167b13d7cd

    SHA256

    a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9

    SHA512

    37622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d

  • C:\Users\Admin\AppData\Local\Temp\20231011T090550_704.exe

    Filesize

    5KB

    MD5

    2e412d7565cfa3515ff03b433620c97c

    SHA1

    fbffcee7f5bc7abc556d18c978e1d4167b13d7cd

    SHA256

    a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9

    SHA512

    37622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d

  • C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe

    Filesize

    5KB

    MD5

    5188fa69e91d1e717d72a6c3a621590f

    SHA1

    aef90608c209fde97d20c5b2d64a64b1c296edbe

    SHA256

    5c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068

    SHA512

    49f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80

  • C:\Users\Admin\AppData\Local\Temp\20231011T090614_899.exe

    Filesize

    5KB

    MD5

    5188fa69e91d1e717d72a6c3a621590f

    SHA1

    aef90608c209fde97d20c5b2d64a64b1c296edbe

    SHA256

    5c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068

    SHA512

    49f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80

  • C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe

    Filesize

    5KB

    MD5

    80ec6e60179476ab9a7ae19c744537ae

    SHA1

    8269e026cfe9e702cb8ff54c3f46fcecb38633e6

    SHA256

    45eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8

    SHA512

    aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0

  • C:\Users\Admin\AppData\Local\Temp\20231011T090636_474.exe

    Filesize

    5KB

    MD5

    80ec6e60179476ab9a7ae19c744537ae

    SHA1

    8269e026cfe9e702cb8ff54c3f46fcecb38633e6

    SHA256

    45eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8

    SHA512

    aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0

  • C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe

    Filesize

    5KB

    MD5

    fb54624bff5e356c73dd794fdb7fea6d

    SHA1

    5769b1c8aa67db16a10573d30ad8f78066e442aa

    SHA256

    8550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a

    SHA512

    b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a

  • C:\Users\Admin\AppData\Local\Temp\20231011T090705_209.exe

    Filesize

    5KB

    MD5

    fb54624bff5e356c73dd794fdb7fea6d

    SHA1

    5769b1c8aa67db16a10573d30ad8f78066e442aa

    SHA256

    8550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a

    SHA512

    b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a

  • C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe

    Filesize

    5KB

    MD5

    6222a4e2a88ae5d21999f6bff96fcc2b

    SHA1

    48ba482f14ed1a7652bb2ec9f6bca3a323f81738

    SHA256

    168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8

    SHA512

    8614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8

  • C:\Users\Admin\AppData\Local\Temp\20231011T090723_430.exe

    Filesize

    5KB

    MD5

    6222a4e2a88ae5d21999f6bff96fcc2b

    SHA1

    48ba482f14ed1a7652bb2ec9f6bca3a323f81738

    SHA256

    168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8

    SHA512

    8614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8

  • C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe

    Filesize

    5KB

    MD5

    d011a2ece4ff67c6fedff7c9655acdba

    SHA1

    ec8f6bcde6461821437d9d1658343f0c17aa1f0f

    SHA256

    5f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd

    SHA512

    15a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265

  • C:\Users\Admin\AppData\Local\Temp\20231011T090737_782.exe

    Filesize

    5KB

    MD5

    d011a2ece4ff67c6fedff7c9655acdba

    SHA1

    ec8f6bcde6461821437d9d1658343f0c17aa1f0f

    SHA256

    5f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd

    SHA512

    15a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265

  • \Users\Admin\AppData\Local\Temp\20231011T090550_704.exe

    Filesize

    5KB

    MD5

    2e412d7565cfa3515ff03b433620c97c

    SHA1

    fbffcee7f5bc7abc556d18c978e1d4167b13d7cd

    SHA256

    a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9

    SHA512

    37622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d

  • \Users\Admin\AppData\Local\Temp\20231011T090550_704.exe

    Filesize

    5KB

    MD5

    2e412d7565cfa3515ff03b433620c97c

    SHA1

    fbffcee7f5bc7abc556d18c978e1d4167b13d7cd

    SHA256

    a8bab4bade5e42f99ea90b716559a9d7709d5eba5df045ee02899cdf574e9af9

    SHA512

    37622d7cb4b80ddaf44ab205558b4563f0ec5072c10d7bb7c83ba33df00219e6d801d5f2d4904ed657e3b0236342ef6fd3a7b913e8a9d6ddb82bd5f7d6a8b54d

  • \Users\Admin\AppData\Local\Temp\20231011T090614_899.exe

    Filesize

    5KB

    MD5

    5188fa69e91d1e717d72a6c3a621590f

    SHA1

    aef90608c209fde97d20c5b2d64a64b1c296edbe

    SHA256

    5c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068

    SHA512

    49f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80

  • \Users\Admin\AppData\Local\Temp\20231011T090614_899.exe

    Filesize

    5KB

    MD5

    5188fa69e91d1e717d72a6c3a621590f

    SHA1

    aef90608c209fde97d20c5b2d64a64b1c296edbe

    SHA256

    5c71e9b9ff426c9110f245ddf7248213f70b842ef8763efc35abb4263d7c4068

    SHA512

    49f2eef66c18bcbc512133d7758b2a2786dd512094eeee2c366d7ac2fd7a44667f08d6c05ad038028e447dfd4b94226238c937ee64b7ecbbaa823815fad27c80

  • \Users\Admin\AppData\Local\Temp\20231011T090636_474.exe

    Filesize

    5KB

    MD5

    80ec6e60179476ab9a7ae19c744537ae

    SHA1

    8269e026cfe9e702cb8ff54c3f46fcecb38633e6

    SHA256

    45eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8

    SHA512

    aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0

  • \Users\Admin\AppData\Local\Temp\20231011T090636_474.exe

    Filesize

    5KB

    MD5

    80ec6e60179476ab9a7ae19c744537ae

    SHA1

    8269e026cfe9e702cb8ff54c3f46fcecb38633e6

    SHA256

    45eee14cea25c31ee76120aaf9d1bac205ba7fdc5c7af15299fe9fe6e298b6c8

    SHA512

    aa025fe546222c431d50ec197c119ce8418c82236490b26f7cff868c54fed6e232e1e6c62d223bdb1f1b1ae6a6e7a80696926d67f1670cf0868a72223fb208f0

  • \Users\Admin\AppData\Local\Temp\20231011T090705_209.exe

    Filesize

    5KB

    MD5

    fb54624bff5e356c73dd794fdb7fea6d

    SHA1

    5769b1c8aa67db16a10573d30ad8f78066e442aa

    SHA256

    8550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a

    SHA512

    b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a

  • \Users\Admin\AppData\Local\Temp\20231011T090705_209.exe

    Filesize

    5KB

    MD5

    fb54624bff5e356c73dd794fdb7fea6d

    SHA1

    5769b1c8aa67db16a10573d30ad8f78066e442aa

    SHA256

    8550addcb8243d40d558fa1a253950eaffe3c82a11d565b488e1dd2f1420e68a

    SHA512

    b0c20f210341528f9b8cc74be7d3f4ed1537a3821ce48d2e42fab5cb7c23c83043f3c66acca2d3fa9818bdcf7d0e8732b3c845be82b1c10890b16af020d8983a

  • \Users\Admin\AppData\Local\Temp\20231011T090723_430.exe

    Filesize

    5KB

    MD5

    6222a4e2a88ae5d21999f6bff96fcc2b

    SHA1

    48ba482f14ed1a7652bb2ec9f6bca3a323f81738

    SHA256

    168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8

    SHA512

    8614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8

  • \Users\Admin\AppData\Local\Temp\20231011T090723_430.exe

    Filesize

    5KB

    MD5

    6222a4e2a88ae5d21999f6bff96fcc2b

    SHA1

    48ba482f14ed1a7652bb2ec9f6bca3a323f81738

    SHA256

    168c7faef8d89aa8ec0d8586204025fcceae0d3bc795753eee666b999216ccf8

    SHA512

    8614075bedc9817d14dfa7e00d03aadaada6b86ae01dd2da1aac21c1c344038864d61bf32196a33c700923767b34add5546dc9014ddc7051bb990d69c72a16c8

  • \Users\Admin\AppData\Local\Temp\20231011T090737_782.exe

    Filesize

    5KB

    MD5

    d011a2ece4ff67c6fedff7c9655acdba

    SHA1

    ec8f6bcde6461821437d9d1658343f0c17aa1f0f

    SHA256

    5f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd

    SHA512

    15a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265

  • \Users\Admin\AppData\Local\Temp\20231011T090737_782.exe

    Filesize

    5KB

    MD5

    d011a2ece4ff67c6fedff7c9655acdba

    SHA1

    ec8f6bcde6461821437d9d1658343f0c17aa1f0f

    SHA256

    5f8c5cdf36bb94e15e73dcfa15621ba78c423c5e2c116a9d1baab5404f7c94cd

    SHA512

    15a4e927df4fca24430b113bc2d4b293e1f0f8523414d98491e091c7866d5f27e162b6882fc2f28c0573f8389e5e7d513f158aeecf00d722e253bcbad1ca2265