Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:06

General

  • Target

    9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe

  • Size

    955KB

  • MD5

    8dc6a8e542ab8638512b8766ed149581

  • SHA1

    b7ef127e5d140538e3cf7b34dfb07b1855a88357

  • SHA256

    9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316

  • SHA512

    acae9b102c4a3aaf7dd8feb08ae931b35183f15387484c74698f005cafc83cb14651c334f0df01f5f3e9fc891836d47d65e41b0fbf8185c9f14e7c47335b6778

  • SSDEEP

    24576:xyecDnJSYr9UwhvlDQVLSCB23m6q0hrmj:kecn4Yr/vQVLSC02r

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe
    "C:\Users\Admin\AppData\Local\Temp\9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 268
                7⤵
                • Program crash
                PID:1676
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3008

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe

          Filesize

          853KB

          MD5

          4b0a1aed204fd7d50ecfe893a9f57e9b

          SHA1

          ba99e680f585116c705086c3ba4b6685fa72d5e4

          SHA256

          5c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1

          SHA512

          3b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe

          Filesize

          853KB

          MD5

          4b0a1aed204fd7d50ecfe893a9f57e9b

          SHA1

          ba99e680f585116c705086c3ba4b6685fa72d5e4

          SHA256

          5c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1

          SHA512

          3b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe

          Filesize

          588KB

          MD5

          745201dc3d5b51fbd50b5544efa0d71d

          SHA1

          f027eb6e4e72be81fc2ec207376023c98ccc9a3f

          SHA256

          f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456

          SHA512

          4342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe

          Filesize

          588KB

          MD5

          745201dc3d5b51fbd50b5544efa0d71d

          SHA1

          f027eb6e4e72be81fc2ec207376023c98ccc9a3f

          SHA256

          f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456

          SHA512

          4342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe

          Filesize

          403KB

          MD5

          0fd72b93457bca2da50b05dedf205bae

          SHA1

          21b69153a7b261555cf7f6910b0035ec36d69432

          SHA256

          d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc

          SHA512

          303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe

          Filesize

          403KB

          MD5

          0fd72b93457bca2da50b05dedf205bae

          SHA1

          21b69153a7b261555cf7f6910b0035ec36d69432

          SHA256

          d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc

          SHA512

          303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe

          Filesize

          853KB

          MD5

          4b0a1aed204fd7d50ecfe893a9f57e9b

          SHA1

          ba99e680f585116c705086c3ba4b6685fa72d5e4

          SHA256

          5c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1

          SHA512

          3b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe

          Filesize

          853KB

          MD5

          4b0a1aed204fd7d50ecfe893a9f57e9b

          SHA1

          ba99e680f585116c705086c3ba4b6685fa72d5e4

          SHA256

          5c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1

          SHA512

          3b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe

          Filesize

          588KB

          MD5

          745201dc3d5b51fbd50b5544efa0d71d

          SHA1

          f027eb6e4e72be81fc2ec207376023c98ccc9a3f

          SHA256

          f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456

          SHA512

          4342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe

          Filesize

          588KB

          MD5

          745201dc3d5b51fbd50b5544efa0d71d

          SHA1

          f027eb6e4e72be81fc2ec207376023c98ccc9a3f

          SHA256

          f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456

          SHA512

          4342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe

          Filesize

          403KB

          MD5

          0fd72b93457bca2da50b05dedf205bae

          SHA1

          21b69153a7b261555cf7f6910b0035ec36d69432

          SHA256

          d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc

          SHA512

          303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe

          Filesize

          403KB

          MD5

          0fd72b93457bca2da50b05dedf205bae

          SHA1

          21b69153a7b261555cf7f6910b0035ec36d69432

          SHA256

          d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc

          SHA512

          303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe

          Filesize

          378KB

          MD5

          a1cbdcf4d9e783f651dd19bf3dc703a7

          SHA1

          3c2c4acfb33fd35f6189d4984efb2f04d8b82c71

          SHA256

          38979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45

          SHA512

          a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2

        • memory/2492-50-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/2492-48-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-40-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-51-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-53-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-55-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-46-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-44-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-42-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2492-41-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB