Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:43

General

  • Target

    321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe

  • Size

    1.0MB

  • MD5

    5b8f378f2dc2830855dc401ac2d65315

  • SHA1

    8544709d39146ec64b9a0d2c9df6c4eeda63f3f4

  • SHA256

    321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27

  • SHA512

    c599d4268d8ab190bb664597dcb28640db760b9dc31efd74b0683468a3ea3645a5fb846f93ff390573b2faf004d792006a893f157958e5fdd542681239989f78

  • SSDEEP

    24576:qyyTAotI+thHX1L81DGHFjJU6PfM50jHL:xeAotIYHXV81DGljJTPfIY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe
    "C:\Users\Admin\AppData\Local\Temp\321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:2928
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:1676
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2764
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 268
                    7⤵
                    • Program crash
                    PID:3000
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 288
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2924

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe

              Filesize

              932KB

              MD5

              50d6f12cc8ae6ad73dd712bf8b8fcc90

              SHA1

              b47569cf57e55df237c2c54e54b43da1321b19be

              SHA256

              1c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e

              SHA512

              4d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe

              Filesize

              932KB

              MD5

              50d6f12cc8ae6ad73dd712bf8b8fcc90

              SHA1

              b47569cf57e55df237c2c54e54b43da1321b19be

              SHA256

              1c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e

              SHA512

              4d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe

              Filesize

              628KB

              MD5

              9bca544fa0fab622e8837d7c4bafa89f

              SHA1

              aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95

              SHA256

              8059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f

              SHA512

              6bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe

              Filesize

              628KB

              MD5

              9bca544fa0fab622e8837d7c4bafa89f

              SHA1

              aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95

              SHA256

              8059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f

              SHA512

              6bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe

              Filesize

              443KB

              MD5

              fb2e9b78d253c4943fb002440dc5dca5

              SHA1

              937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b

              SHA256

              81753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c

              SHA512

              0607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe

              Filesize

              443KB

              MD5

              fb2e9b78d253c4943fb002440dc5dca5

              SHA1

              937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b

              SHA256

              81753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c

              SHA512

              0607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe

              Filesize

              932KB

              MD5

              50d6f12cc8ae6ad73dd712bf8b8fcc90

              SHA1

              b47569cf57e55df237c2c54e54b43da1321b19be

              SHA256

              1c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e

              SHA512

              4d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359

            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe

              Filesize

              932KB

              MD5

              50d6f12cc8ae6ad73dd712bf8b8fcc90

              SHA1

              b47569cf57e55df237c2c54e54b43da1321b19be

              SHA256

              1c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e

              SHA512

              4d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe

              Filesize

              628KB

              MD5

              9bca544fa0fab622e8837d7c4bafa89f

              SHA1

              aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95

              SHA256

              8059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f

              SHA512

              6bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7

            • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe

              Filesize

              628KB

              MD5

              9bca544fa0fab622e8837d7c4bafa89f

              SHA1

              aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95

              SHA256

              8059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f

              SHA512

              6bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe

              Filesize

              443KB

              MD5

              fb2e9b78d253c4943fb002440dc5dca5

              SHA1

              937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b

              SHA256

              81753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c

              SHA512

              0607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e

            • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe

              Filesize

              443KB

              MD5

              fb2e9b78d253c4943fb002440dc5dca5

              SHA1

              937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b

              SHA256

              81753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c

              SHA512

              0607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe

              Filesize

              700KB

              MD5

              3f8df8626cd836b1b05563746ca282da

              SHA1

              826b186f9b1573ce97cd7f04708177ce75dd9afb

              SHA256

              62055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e

              SHA512

              b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea

            • memory/2764-46-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-50-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-43-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-44-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-52-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-54-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-47-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

              Filesize

              4KB

            • memory/2764-48-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/2764-45-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB