Analysis

  • max time kernel
    169s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:54

General

  • Target

    486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe

  • Size

    1.0MB

  • MD5

    4c77a170f32fd3bdbd05377a1e17bd82

  • SHA1

    36b4c1c8bd3014d92884e6f8e0c7de55cd63c5ec

  • SHA256

    486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8

  • SHA512

    5331f8c1c0c1161575f265444b5acb685af5d4d0af485eb059ae2d2426ebabbded68f40c7a1548116533754c4b5d77e991c849f02b87ada77a1d4a60001bb36a

  • SSDEEP

    24576:/yB+ePuQ/7S4Z17W5YtICxhXHaRuGaXQf:Kke9zC5iIMH+Eg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
    "C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1692
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 268
                7⤵
                • Program crash
                PID:2976
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

          Filesize

          932KB

          MD5

          1f8cb501734a3c4b435833bddd8c047a

          SHA1

          b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

          SHA256

          d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

          SHA512

          0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

          Filesize

          932KB

          MD5

          1f8cb501734a3c4b435833bddd8c047a

          SHA1

          b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

          SHA256

          d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

          SHA512

          0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

          Filesize

          628KB

          MD5

          5a52cd501bd5949ed07943e5bba9eacb

          SHA1

          872dd0e48ed629c25b7dfd7024e9947cb6618887

          SHA256

          408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

          SHA512

          19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

          Filesize

          628KB

          MD5

          5a52cd501bd5949ed07943e5bba9eacb

          SHA1

          872dd0e48ed629c25b7dfd7024e9947cb6618887

          SHA256

          408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

          SHA512

          19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

          Filesize

          443KB

          MD5

          033bf0754723e9bfcafede0fa2a6940c

          SHA1

          404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

          SHA256

          c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

          SHA512

          811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

          Filesize

          443KB

          MD5

          033bf0754723e9bfcafede0fa2a6940c

          SHA1

          404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

          SHA256

          c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

          SHA512

          811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

          Filesize

          932KB

          MD5

          1f8cb501734a3c4b435833bddd8c047a

          SHA1

          b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

          SHA256

          d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

          SHA512

          0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe

          Filesize

          932KB

          MD5

          1f8cb501734a3c4b435833bddd8c047a

          SHA1

          b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1

          SHA256

          d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031

          SHA512

          0ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

          Filesize

          628KB

          MD5

          5a52cd501bd5949ed07943e5bba9eacb

          SHA1

          872dd0e48ed629c25b7dfd7024e9947cb6618887

          SHA256

          408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

          SHA512

          19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

        • \Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe

          Filesize

          628KB

          MD5

          5a52cd501bd5949ed07943e5bba9eacb

          SHA1

          872dd0e48ed629c25b7dfd7024e9947cb6618887

          SHA256

          408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b

          SHA512

          19cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

          Filesize

          443KB

          MD5

          033bf0754723e9bfcafede0fa2a6940c

          SHA1

          404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

          SHA256

          c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

          SHA512

          811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

        • \Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe

          Filesize

          443KB

          MD5

          033bf0754723e9bfcafede0fa2a6940c

          SHA1

          404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a

          SHA256

          c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6

          SHA512

          811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • \Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe

          Filesize

          700KB

          MD5

          c691e82760eac0752db2d5dbf44179c1

          SHA1

          8c404e7c09d23990c0982c43691e1b4af6531034

          SHA256

          adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae

          SHA512

          d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5

        • memory/1860-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1860-48-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-43-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-50-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-52-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-54-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-47-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-45-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-46-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/1860-44-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB