Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 05:54

General

  • Target

    8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe

  • Size

    1.3MB

  • MD5

    aa61ea1f0b44b10e36d34b44be724a71

  • SHA1

    f3498c714e2e600a15c4944128a63ad3fde01358

  • SHA256

    8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b

  • SHA512

    62b48c8c8ebe1673b3cb7f3ccd5e0ec45bd353fecb2cf186dc7bed838c5f4d1717d7e61576320f159a9ade6c3c1688084f9fe7635d50ddc6c484cf3a5f7bc824

  • SSDEEP

    24576:9yBDoubteka9EVp9jFT7AP5LT5r7bHJ2lpJdOB4De/qrkN39SHmcs:YeuzIEP9VU5r7zU384s39s

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe
    "C:\Users\Admin\AppData\Local\Temp\8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1984
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 268
                7⤵
                • Program crash
                PID:2572
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 268
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe

    Filesize

    1.2MB

    MD5

    7af5289e891c43c12b55d957d10653bb

    SHA1

    a8f2a195bc5e210197740b297b1e68510209d6db

    SHA256

    cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702

    SHA512

    5d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe

    Filesize

    1.2MB

    MD5

    7af5289e891c43c12b55d957d10653bb

    SHA1

    a8f2a195bc5e210197740b297b1e68510209d6db

    SHA256

    cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702

    SHA512

    5d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe

    Filesize

    921KB

    MD5

    a5f1e27e359b324a7badb0eafb9cba3c

    SHA1

    24e984fa30d64cfd49c550595aaf79de59bcc4bb

    SHA256

    f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1

    SHA512

    1b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe

    Filesize

    921KB

    MD5

    a5f1e27e359b324a7badb0eafb9cba3c

    SHA1

    24e984fa30d64cfd49c550595aaf79de59bcc4bb

    SHA256

    f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1

    SHA512

    1b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe

    Filesize

    529KB

    MD5

    0e53dc14ded65a369207118046d725eb

    SHA1

    c08a22c652870930d37e3b92ad5ed7975b244ef1

    SHA256

    128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba

    SHA512

    f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe

    Filesize

    529KB

    MD5

    0e53dc14ded65a369207118046d725eb

    SHA1

    c08a22c652870930d37e3b92ad5ed7975b244ef1

    SHA256

    128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba

    SHA512

    f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe

    Filesize

    1.2MB

    MD5

    7af5289e891c43c12b55d957d10653bb

    SHA1

    a8f2a195bc5e210197740b297b1e68510209d6db

    SHA256

    cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702

    SHA512

    5d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe

    Filesize

    1.2MB

    MD5

    7af5289e891c43c12b55d957d10653bb

    SHA1

    a8f2a195bc5e210197740b297b1e68510209d6db

    SHA256

    cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702

    SHA512

    5d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe

    Filesize

    921KB

    MD5

    a5f1e27e359b324a7badb0eafb9cba3c

    SHA1

    24e984fa30d64cfd49c550595aaf79de59bcc4bb

    SHA256

    f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1

    SHA512

    1b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe

    Filesize

    921KB

    MD5

    a5f1e27e359b324a7badb0eafb9cba3c

    SHA1

    24e984fa30d64cfd49c550595aaf79de59bcc4bb

    SHA256

    f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1

    SHA512

    1b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe

    Filesize

    529KB

    MD5

    0e53dc14ded65a369207118046d725eb

    SHA1

    c08a22c652870930d37e3b92ad5ed7975b244ef1

    SHA256

    128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba

    SHA512

    f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe

    Filesize

    529KB

    MD5

    0e53dc14ded65a369207118046d725eb

    SHA1

    c08a22c652870930d37e3b92ad5ed7975b244ef1

    SHA256

    128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba

    SHA512

    f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe

    Filesize

    1.0MB

    MD5

    e971b075c8f141bb376a8c6b5061e7a6

    SHA1

    19ed9194d823669bbea6b19d14a13fafad6e18f1

    SHA256

    77c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1

    SHA512

    343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf

  • memory/1984-47-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-48-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-49-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/1984-50-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-52-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-54-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-46-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-45-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-44-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1984-43-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB