Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 04:13

General

  • Target

    23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6.exe

  • Size

    956KB

  • MD5

    31fd8e589dfe54ad536aaca731464837

  • SHA1

    0672bbd5423629166ec10af4a6146743853eb50f

  • SHA256

    23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6

  • SHA512

    89721332708e9801dfda6faf69a230b5ece5cc15a48d573fc7589efe04844f0d41806c3172b2dfcd1ea3645a09e89855e8346745310f938a057704ecc626224f

  • SSDEEP

    24576:gyuTPbU+tkm/RSLsEkPBVOi4rpT94ZTl95E2Wq:naUw9RSTkLcrdKR5ET

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6.exe
    "C:\Users\Admin\AppData\Local\Temp\23e62e4fae5dae34e3d0a51e62e232c7c08e438f3cf769bcf2c362c553287bb6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2780
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 268
                7⤵
                • Program crash
                PID:2428
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 272
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe

    Filesize

    854KB

    MD5

    e8a291b6f6b970536019c424935cf889

    SHA1

    496b61c20479e002a33ce762e80df4b2fe2b6703

    SHA256

    b5f6a47cd1c02cc8eb5f29e7525feee8ccc75bdb2e9c3b5c16762601e4eb191f

    SHA512

    13d5c0ed35663d8fe21f124f1e5a309318cb7c352fb46722b2e9a8fc1e971c7cf6df91ad361e15eab7f9d68f8781efbb5487cac161c4035f317c4e14586f2eaf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe

    Filesize

    854KB

    MD5

    e8a291b6f6b970536019c424935cf889

    SHA1

    496b61c20479e002a33ce762e80df4b2fe2b6703

    SHA256

    b5f6a47cd1c02cc8eb5f29e7525feee8ccc75bdb2e9c3b5c16762601e4eb191f

    SHA512

    13d5c0ed35663d8fe21f124f1e5a309318cb7c352fb46722b2e9a8fc1e971c7cf6df91ad361e15eab7f9d68f8781efbb5487cac161c4035f317c4e14586f2eaf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe

    Filesize

    590KB

    MD5

    94a86eff259d9989b0733a4ee9a68a03

    SHA1

    460f09fcc8e58219bd7241b90c0c5ac07906c67a

    SHA256

    b32248ce41cc08d315486960028d8c9e83746bb2ba2668367f9aa07cd91cda66

    SHA512

    20a74d1f11986144481fb0ee3431e100de04560568fc912089e25ef58ca93ce81167a391c5173b7e2c2b572eac3f5c7d471bccb8abcd2e5ce829017d6d56f08f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe

    Filesize

    590KB

    MD5

    94a86eff259d9989b0733a4ee9a68a03

    SHA1

    460f09fcc8e58219bd7241b90c0c5ac07906c67a

    SHA256

    b32248ce41cc08d315486960028d8c9e83746bb2ba2668367f9aa07cd91cda66

    SHA512

    20a74d1f11986144481fb0ee3431e100de04560568fc912089e25ef58ca93ce81167a391c5173b7e2c2b572eac3f5c7d471bccb8abcd2e5ce829017d6d56f08f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe

    Filesize

    404KB

    MD5

    1beda0446c6d5f0cc76ec27314a5bdd8

    SHA1

    db592939c6301bb9c5a8d0463b0b890bd89d5508

    SHA256

    c76bfbce421933f3b095c47fb8f064d856a4133055432a9cc222129f5c76721e

    SHA512

    f41bf248e44b2271a19aea956d034a169a57fc2159da65223b23380d8119294cddb4e5ef9466347a5b5983858bd17fe57b4f2cbf77f468b5eec0465d54fe28bd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe

    Filesize

    404KB

    MD5

    1beda0446c6d5f0cc76ec27314a5bdd8

    SHA1

    db592939c6301bb9c5a8d0463b0b890bd89d5508

    SHA256

    c76bfbce421933f3b095c47fb8f064d856a4133055432a9cc222129f5c76721e

    SHA512

    f41bf248e44b2271a19aea956d034a169a57fc2159da65223b23380d8119294cddb4e5ef9466347a5b5983858bd17fe57b4f2cbf77f468b5eec0465d54fe28bd

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe

    Filesize

    854KB

    MD5

    e8a291b6f6b970536019c424935cf889

    SHA1

    496b61c20479e002a33ce762e80df4b2fe2b6703

    SHA256

    b5f6a47cd1c02cc8eb5f29e7525feee8ccc75bdb2e9c3b5c16762601e4eb191f

    SHA512

    13d5c0ed35663d8fe21f124f1e5a309318cb7c352fb46722b2e9a8fc1e971c7cf6df91ad361e15eab7f9d68f8781efbb5487cac161c4035f317c4e14586f2eaf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x0145607.exe

    Filesize

    854KB

    MD5

    e8a291b6f6b970536019c424935cf889

    SHA1

    496b61c20479e002a33ce762e80df4b2fe2b6703

    SHA256

    b5f6a47cd1c02cc8eb5f29e7525feee8ccc75bdb2e9c3b5c16762601e4eb191f

    SHA512

    13d5c0ed35663d8fe21f124f1e5a309318cb7c352fb46722b2e9a8fc1e971c7cf6df91ad361e15eab7f9d68f8781efbb5487cac161c4035f317c4e14586f2eaf

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe

    Filesize

    590KB

    MD5

    94a86eff259d9989b0733a4ee9a68a03

    SHA1

    460f09fcc8e58219bd7241b90c0c5ac07906c67a

    SHA256

    b32248ce41cc08d315486960028d8c9e83746bb2ba2668367f9aa07cd91cda66

    SHA512

    20a74d1f11986144481fb0ee3431e100de04560568fc912089e25ef58ca93ce81167a391c5173b7e2c2b572eac3f5c7d471bccb8abcd2e5ce829017d6d56f08f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x4610526.exe

    Filesize

    590KB

    MD5

    94a86eff259d9989b0733a4ee9a68a03

    SHA1

    460f09fcc8e58219bd7241b90c0c5ac07906c67a

    SHA256

    b32248ce41cc08d315486960028d8c9e83746bb2ba2668367f9aa07cd91cda66

    SHA512

    20a74d1f11986144481fb0ee3431e100de04560568fc912089e25ef58ca93ce81167a391c5173b7e2c2b572eac3f5c7d471bccb8abcd2e5ce829017d6d56f08f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe

    Filesize

    404KB

    MD5

    1beda0446c6d5f0cc76ec27314a5bdd8

    SHA1

    db592939c6301bb9c5a8d0463b0b890bd89d5508

    SHA256

    c76bfbce421933f3b095c47fb8f064d856a4133055432a9cc222129f5c76721e

    SHA512

    f41bf248e44b2271a19aea956d034a169a57fc2159da65223b23380d8119294cddb4e5ef9466347a5b5983858bd17fe57b4f2cbf77f468b5eec0465d54fe28bd

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x5648618.exe

    Filesize

    404KB

    MD5

    1beda0446c6d5f0cc76ec27314a5bdd8

    SHA1

    db592939c6301bb9c5a8d0463b0b890bd89d5508

    SHA256

    c76bfbce421933f3b095c47fb8f064d856a4133055432a9cc222129f5c76721e

    SHA512

    f41bf248e44b2271a19aea956d034a169a57fc2159da65223b23380d8119294cddb4e5ef9466347a5b5983858bd17fe57b4f2cbf77f468b5eec0465d54fe28bd

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g3042038.exe

    Filesize

    378KB

    MD5

    7f0afe443fe72639ebbfb5b969acf7e1

    SHA1

    b9b2f5eb06b79b30ba2881e73ba415886386ce30

    SHA256

    925a3d75c6ef346eaac61f9b5adcd92af50431e101895b7f0d87e2db9884ba06

    SHA512

    0586a03a115756a9569a6efe3fbd87433f041110a19e1e2b586e1e90921ca5b451a886f82ef52f90460809cbad4a7aede66a802455b24f60e46ef5d6d5642ba9

  • memory/2528-45-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-51-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-42-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-43-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-41-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-40-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-49-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-46-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2528-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2528-44-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB