Analysis

  • max time kernel
    121s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 02:23

General

  • Target

    12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe

  • Size

    937KB

  • MD5

    99326f6cd19b52665cf45778936ef46a

  • SHA1

    f2926ed54c015c3f704e51262c279c390b3c4337

  • SHA256

    12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a

  • SHA512

    c1d1bdc435f67631fec6520e6b49fe74119c4a03605115e6ec334f3c62b6714977deea759df8cf1209d74e75bfa6a99cc6db2f7274b66b4656ac8525979ad9ba

  • SSDEEP

    24576:Vys31TYxce5KotI3+GZVobgU1oMLMNmInnrAZeGaW:ws3Cxc+7K3+ibU1oMYQInF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe
    "C:\Users\Admin\AppData\Local\Temp\12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2636
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2256
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 268
                  7⤵
                  • Program crash
                  PID:1528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 280
                6⤵
                • Loads dropped DLL
                • Program crash
                PID:2584

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe

      Filesize

      835KB

      MD5

      60029ce4304d96e72149337e00ed127b

      SHA1

      c28460cd1ccadd7875411188b1894983dc893858

      SHA256

      15c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518

      SHA512

      a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe

      Filesize

      835KB

      MD5

      60029ce4304d96e72149337e00ed127b

      SHA1

      c28460cd1ccadd7875411188b1894983dc893858

      SHA256

      15c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518

      SHA512

      a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe

      Filesize

      570KB

      MD5

      e44e28ebffb17318d1baa57f98e95882

      SHA1

      2bc6ee43ad644119c78121b8935de0a1af862f21

      SHA256

      e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c

      SHA512

      8468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe

      Filesize

      570KB

      MD5

      e44e28ebffb17318d1baa57f98e95882

      SHA1

      2bc6ee43ad644119c78121b8935de0a1af862f21

      SHA256

      e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c

      SHA512

      8468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe

      Filesize

      394KB

      MD5

      455ed6a2d8241a0562a6ad9a113affb5

      SHA1

      bf94733ae916952cb9e6c8cd95705726b334fc3a

      SHA256

      99d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd

      SHA512

      a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe

      Filesize

      394KB

      MD5

      455ed6a2d8241a0562a6ad9a113affb5

      SHA1

      bf94733ae916952cb9e6c8cd95705726b334fc3a

      SHA256

      99d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd

      SHA512

      a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe

      Filesize

      835KB

      MD5

      60029ce4304d96e72149337e00ed127b

      SHA1

      c28460cd1ccadd7875411188b1894983dc893858

      SHA256

      15c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518

      SHA512

      a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe

      Filesize

      835KB

      MD5

      60029ce4304d96e72149337e00ed127b

      SHA1

      c28460cd1ccadd7875411188b1894983dc893858

      SHA256

      15c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518

      SHA512

      a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe

      Filesize

      570KB

      MD5

      e44e28ebffb17318d1baa57f98e95882

      SHA1

      2bc6ee43ad644119c78121b8935de0a1af862f21

      SHA256

      e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c

      SHA512

      8468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d

    • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe

      Filesize

      570KB

      MD5

      e44e28ebffb17318d1baa57f98e95882

      SHA1

      2bc6ee43ad644119c78121b8935de0a1af862f21

      SHA256

      e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c

      SHA512

      8468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe

      Filesize

      394KB

      MD5

      455ed6a2d8241a0562a6ad9a113affb5

      SHA1

      bf94733ae916952cb9e6c8cd95705726b334fc3a

      SHA256

      99d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd

      SHA512

      a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691

    • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe

      Filesize

      394KB

      MD5

      455ed6a2d8241a0562a6ad9a113affb5

      SHA1

      bf94733ae916952cb9e6c8cd95705726b334fc3a

      SHA256

      99d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd

      SHA512

      a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe

      Filesize

      365KB

      MD5

      84ee06973f7cf3f386279b0c256dbe77

      SHA1

      82865ac8c9497e1562bd5998190faa179a05972f

      SHA256

      34bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c

      SHA512

      7b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328

    • memory/2256-44-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-41-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-40-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-47-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-49-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-51-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-42-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-43-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-45-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/2256-46-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB