Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:34

General

  • Target

    x3868327.exe

  • Size

    390KB

  • MD5

    da9c07032bb8c10e67bf1087b6ad61a3

  • SHA1

    073da228e78a4b21d687aac7b6dd468d2e338a57

  • SHA256

    4df082db42dc215b33745e1c19ed1f34d4db4af07fc66087fae716cf2135881c

  • SHA512

    bd1cb28e5fa2ab812e75359e562fd3f93dc35f434be62267cc8d92adb11639d009c0870cef363ed0affec0cb39b65343a2cfeb5c86bcc699b9665a90148d445d

  • SSDEEP

    6144:K9y+bnr+Pp0yN90QEVDzZxEuDCV+azUs6MqgijV/Q3+bxNjZWV7LYI:7Mrby90/DzEuDrsxij6+VNja/z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x3868327.exe
    "C:\Users\Admin\AppData\Local\Temp\x3868327.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 268
          4⤵
          • Program crash
          PID:2600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 272
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe

    Filesize

    364KB

    MD5

    3a184aeb92fc87dc08af0d194786fb56

    SHA1

    6b92867b073f0ed1e23bcf16e828e951f8af006d

    SHA256

    2c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb

    SHA512

    3e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e

  • memory/2852-16-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-15-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-14-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-13-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-22-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-24-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-19-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2852-20-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-18-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2852-17-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB