Analysis

  • max time kernel
    119s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 01:11

General

  • Target

    4cc1a5bcb9079ea4db1d0b60849f0fb0e00e26276c21b521dca65b5280fe8f9c.exe

  • Size

    929KB

  • MD5

    2aa38d670ede428c2c4c6f48cb589a72

  • SHA1

    9faf897a3af6f8a416b8354be51080efedb9a04d

  • SHA256

    4cc1a5bcb9079ea4db1d0b60849f0fb0e00e26276c21b521dca65b5280fe8f9c

  • SHA512

    22c5bd4602aa52746b19a863dfc90765ce2052719b63a1ac827506f27efacb94c76d6e2e213f36b7d256eeec507ba25b72221b77325391c5c044f104e28235f3

  • SSDEEP

    12288:pMrPy90wewGpj1zCca6FEDMYGuf/+AuqhPCabnrXvGUEBCCt4UhhuvQJLIB+rLPJ:qyPeBwcMTvpzhPCaf7jCtRhZRI8LwDI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cc1a5bcb9079ea4db1d0b60849f0fb0e00e26276c21b521dca65b5280fe8f9c.exe
    "C:\Users\Admin\AppData\Local\Temp\4cc1a5bcb9079ea4db1d0b60849f0fb0e00e26276c21b521dca65b5280fe8f9c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2284
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 268
                7⤵
                • Program crash
                PID:2800
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe

    Filesize

    827KB

    MD5

    6a3a555acf47b067720d4c0110ac4529

    SHA1

    73a0cb84936114f38ad2e651be27c17944f133e9

    SHA256

    f9423ebd86e480327a8ed3c95a9163a93aee54d92f28656d4f87c5b4c4434e29

    SHA512

    195afed36f53d008dcce6bca183e1937cb9d1226b59488deb81d1684ef095d687670b0263d5efb527cd61684147ffbd79bbdd33d52b0ceb1769a0e48d4569357

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe

    Filesize

    827KB

    MD5

    6a3a555acf47b067720d4c0110ac4529

    SHA1

    73a0cb84936114f38ad2e651be27c17944f133e9

    SHA256

    f9423ebd86e480327a8ed3c95a9163a93aee54d92f28656d4f87c5b4c4434e29

    SHA512

    195afed36f53d008dcce6bca183e1937cb9d1226b59488deb81d1684ef095d687670b0263d5efb527cd61684147ffbd79bbdd33d52b0ceb1769a0e48d4569357

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe

    Filesize

    567KB

    MD5

    13bc0af49532a94c3f55fc1ad7cedff5

    SHA1

    7198bf64df2493a17f3cf246a85ef2b4ac232e73

    SHA256

    3ec2a5f3365044b148e16133d416475ba16142aabd25cfa215ee3b8bdf1fdd54

    SHA512

    3bb64e18ab78b75143c53068d61595528ac47e2f13828130ed415f2affd0a13152feb1d43647a520dc4e63659b23f79b81433a2ddcf9f62edde9b107b23aea81

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe

    Filesize

    567KB

    MD5

    13bc0af49532a94c3f55fc1ad7cedff5

    SHA1

    7198bf64df2493a17f3cf246a85ef2b4ac232e73

    SHA256

    3ec2a5f3365044b148e16133d416475ba16142aabd25cfa215ee3b8bdf1fdd54

    SHA512

    3bb64e18ab78b75143c53068d61595528ac47e2f13828130ed415f2affd0a13152feb1d43647a520dc4e63659b23f79b81433a2ddcf9f62edde9b107b23aea81

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe

    Filesize

    390KB

    MD5

    793c21710d24416a52bde25ef0c00136

    SHA1

    b063dce74093b29c34b6e50891d141e055fd39c5

    SHA256

    a885b563e8a4be5cd393bd423bc9ee9c4157b4393849b7cb77c87a1d08879121

    SHA512

    c95e5efb3e21c76ce7dc0cb6566bcd9604be289a0706df6b3afb27de69e5f1cb710e7aa0dc3144b936ea203089920e6aaf95db2212770d35841e3b31b96cdaa0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe

    Filesize

    390KB

    MD5

    793c21710d24416a52bde25ef0c00136

    SHA1

    b063dce74093b29c34b6e50891d141e055fd39c5

    SHA256

    a885b563e8a4be5cd393bd423bc9ee9c4157b4393849b7cb77c87a1d08879121

    SHA512

    c95e5efb3e21c76ce7dc0cb6566bcd9604be289a0706df6b3afb27de69e5f1cb710e7aa0dc3144b936ea203089920e6aaf95db2212770d35841e3b31b96cdaa0

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe

    Filesize

    827KB

    MD5

    6a3a555acf47b067720d4c0110ac4529

    SHA1

    73a0cb84936114f38ad2e651be27c17944f133e9

    SHA256

    f9423ebd86e480327a8ed3c95a9163a93aee54d92f28656d4f87c5b4c4434e29

    SHA512

    195afed36f53d008dcce6bca183e1937cb9d1226b59488deb81d1684ef095d687670b0263d5efb527cd61684147ffbd79bbdd33d52b0ceb1769a0e48d4569357

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1244578.exe

    Filesize

    827KB

    MD5

    6a3a555acf47b067720d4c0110ac4529

    SHA1

    73a0cb84936114f38ad2e651be27c17944f133e9

    SHA256

    f9423ebd86e480327a8ed3c95a9163a93aee54d92f28656d4f87c5b4c4434e29

    SHA512

    195afed36f53d008dcce6bca183e1937cb9d1226b59488deb81d1684ef095d687670b0263d5efb527cd61684147ffbd79bbdd33d52b0ceb1769a0e48d4569357

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe

    Filesize

    567KB

    MD5

    13bc0af49532a94c3f55fc1ad7cedff5

    SHA1

    7198bf64df2493a17f3cf246a85ef2b4ac232e73

    SHA256

    3ec2a5f3365044b148e16133d416475ba16142aabd25cfa215ee3b8bdf1fdd54

    SHA512

    3bb64e18ab78b75143c53068d61595528ac47e2f13828130ed415f2affd0a13152feb1d43647a520dc4e63659b23f79b81433a2ddcf9f62edde9b107b23aea81

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4925281.exe

    Filesize

    567KB

    MD5

    13bc0af49532a94c3f55fc1ad7cedff5

    SHA1

    7198bf64df2493a17f3cf246a85ef2b4ac232e73

    SHA256

    3ec2a5f3365044b148e16133d416475ba16142aabd25cfa215ee3b8bdf1fdd54

    SHA512

    3bb64e18ab78b75143c53068d61595528ac47e2f13828130ed415f2affd0a13152feb1d43647a520dc4e63659b23f79b81433a2ddcf9f62edde9b107b23aea81

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe

    Filesize

    390KB

    MD5

    793c21710d24416a52bde25ef0c00136

    SHA1

    b063dce74093b29c34b6e50891d141e055fd39c5

    SHA256

    a885b563e8a4be5cd393bd423bc9ee9c4157b4393849b7cb77c87a1d08879121

    SHA512

    c95e5efb3e21c76ce7dc0cb6566bcd9604be289a0706df6b3afb27de69e5f1cb710e7aa0dc3144b936ea203089920e6aaf95db2212770d35841e3b31b96cdaa0

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x2429086.exe

    Filesize

    390KB

    MD5

    793c21710d24416a52bde25ef0c00136

    SHA1

    b063dce74093b29c34b6e50891d141e055fd39c5

    SHA256

    a885b563e8a4be5cd393bd423bc9ee9c4157b4393849b7cb77c87a1d08879121

    SHA512

    c95e5efb3e21c76ce7dc0cb6566bcd9604be289a0706df6b3afb27de69e5f1cb710e7aa0dc3144b936ea203089920e6aaf95db2212770d35841e3b31b96cdaa0

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g5626810.exe

    Filesize

    364KB

    MD5

    1a95866724a31d6299be71fd7118d7a1

    SHA1

    6836ccd9a56ce67208aff588ddef1c2330369d37

    SHA256

    1dbb38e6e75b10e9eaa051fcc3d6e4c079e7dd097cca190931199050fa477515

    SHA512

    ebea9077d12857fb6a8f5e597f992afe7ed59002db4c0fcd9d6a4f63a1292f2bc3d6e09673b20cfa499ac4c675f400370a44155dd45d51f69ec93d2cba7e2664

  • memory/2528-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2528-44-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-43-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-50-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-52-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-54-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-48-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-47-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-45-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2528-46-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB