Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 03:33

General

  • Target

    627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe

  • Size

    937KB

  • MD5

    f4858baad787af8258f79a1b03118837

  • SHA1

    5ae3fa000cc70d0648656e580a535b5400e763d5

  • SHA256

    627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1

  • SHA512

    9d66d396fae787c1b27513e59a4c81ebf3570217beb398ee26dcee9770bb80fd760181032d03788440fbfce89c2356c6a7ae9911e6a69ed84db1761dc7c3cd0c

  • SSDEEP

    12288:8Mrzy90j6pp4VcjV216MZxy2QS6m4PppufEv3S2MFrY5JDFi3Z/zXb4CNqzg+gql:nyfsyW6AaLerolFi3ZjcClGB+H9H4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe
    "C:\Users\Admin\AppData\Local\Temp\627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2832
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 268
                7⤵
                • Program crash
                PID:2456
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe

    Filesize

    835KB

    MD5

    07eb55b2d1cc5206ff31929c62ad18eb

    SHA1

    1ca53d5236ecece683c2b39a74d74c657bbde4bc

    SHA256

    63862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a

    SHA512

    7fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe

    Filesize

    835KB

    MD5

    07eb55b2d1cc5206ff31929c62ad18eb

    SHA1

    1ca53d5236ecece683c2b39a74d74c657bbde4bc

    SHA256

    63862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a

    SHA512

    7fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe

    Filesize

    570KB

    MD5

    3f8cc0faafa6b6d57a221b7404f09052

    SHA1

    ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a

    SHA256

    cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6

    SHA512

    a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe

    Filesize

    570KB

    MD5

    3f8cc0faafa6b6d57a221b7404f09052

    SHA1

    ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a

    SHA256

    cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6

    SHA512

    a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe

    Filesize

    394KB

    MD5

    e1785f79a70e49b22e127c1707459b3d

    SHA1

    9cda1c3f0abd20cd1c325080f8d9006f483f0d1a

    SHA256

    3f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719

    SHA512

    c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe

    Filesize

    394KB

    MD5

    e1785f79a70e49b22e127c1707459b3d

    SHA1

    9cda1c3f0abd20cd1c325080f8d9006f483f0d1a

    SHA256

    3f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719

    SHA512

    c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe

    Filesize

    835KB

    MD5

    07eb55b2d1cc5206ff31929c62ad18eb

    SHA1

    1ca53d5236ecece683c2b39a74d74c657bbde4bc

    SHA256

    63862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a

    SHA512

    7fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe

    Filesize

    835KB

    MD5

    07eb55b2d1cc5206ff31929c62ad18eb

    SHA1

    1ca53d5236ecece683c2b39a74d74c657bbde4bc

    SHA256

    63862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a

    SHA512

    7fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe

    Filesize

    570KB

    MD5

    3f8cc0faafa6b6d57a221b7404f09052

    SHA1

    ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a

    SHA256

    cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6

    SHA512

    a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe

    Filesize

    570KB

    MD5

    3f8cc0faafa6b6d57a221b7404f09052

    SHA1

    ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a

    SHA256

    cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6

    SHA512

    a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe

    Filesize

    394KB

    MD5

    e1785f79a70e49b22e127c1707459b3d

    SHA1

    9cda1c3f0abd20cd1c325080f8d9006f483f0d1a

    SHA256

    3f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719

    SHA512

    c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe

    Filesize

    394KB

    MD5

    e1785f79a70e49b22e127c1707459b3d

    SHA1

    9cda1c3f0abd20cd1c325080f8d9006f483f0d1a

    SHA256

    3f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719

    SHA512

    c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe

    Filesize

    365KB

    MD5

    ff0b29f0bedefbbd25834e7b1f2ad95c

    SHA1

    1ea758e84d89c639d92305f73607a0d8d32054c8

    SHA256

    d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f

    SHA512

    a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff

  • memory/2616-42-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-46-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2616-47-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-44-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-49-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-51-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-45-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-43-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-41-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2616-40-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB