Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 05:04

General

  • Target

    bce1cfaaf391a9dd8498ed23c1daff9bf320e801f15d989df2a1fd017df9c0d8.exe

  • Size

    1.5MB

  • MD5

    042b5c481ee260fa0547a2c5e6ff6913

  • SHA1

    c381363b41f0e13e370e7eef1753d3edcf0b8518

  • SHA256

    bce1cfaaf391a9dd8498ed23c1daff9bf320e801f15d989df2a1fd017df9c0d8

  • SHA512

    bd44b5aaac78159904e79ae0984a9de5dc9e7a7dce1675d1e3fec1604d369cf518d5111381142f502f06c124c74c717e6baa6982a9bf59cac63be7e4dc7b894c

  • SSDEEP

    24576:cyx3XuF/ew1vZ+H29ViqUG1ecoKSvDb7zQto60eP0rfpk1/QEbsgDO+hX8:LQ7vICVHX1e8QleP0Fa/QEbsa9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bce1cfaaf391a9dd8498ed23c1daff9bf320e801f15d989df2a1fd017df9c0d8.exe
    "C:\Users\Admin\AppData\Local\Temp\bce1cfaaf391a9dd8498ed23c1daff9bf320e801f15d989df2a1fd017df9c0d8.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2332
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2948
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2688
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:2240
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2544
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 268
                    8⤵
                    • Program crash
                    PID:2476
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 280
                  7⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2596

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe

            Filesize

            1.3MB

            MD5

            1a93ad650d6355515970820e7a986387

            SHA1

            73e04234dfc0494075da84123d817b8eb6fb3edb

            SHA256

            7307b955314202350aa41cb0a47389e999e178b47e08fa1cf10dc18427364a6e

            SHA512

            9d427a7c3becde59e0d6c50c5b9e980068a678be0b7c5b504f88bbd859b5f5b4afc25f74f14eb14c2b9064cd121705b1ab841a1a7439dd758a7a398d13cfc976

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe

            Filesize

            1.3MB

            MD5

            1a93ad650d6355515970820e7a986387

            SHA1

            73e04234dfc0494075da84123d817b8eb6fb3edb

            SHA256

            7307b955314202350aa41cb0a47389e999e178b47e08fa1cf10dc18427364a6e

            SHA512

            9d427a7c3becde59e0d6c50c5b9e980068a678be0b7c5b504f88bbd859b5f5b4afc25f74f14eb14c2b9064cd121705b1ab841a1a7439dd758a7a398d13cfc976

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe

            Filesize

            1.1MB

            MD5

            5e72aa3ace4666f05941c02bdb58c1f9

            SHA1

            87feacd6a24de7dbc5760c5f1b6a7b7abb1b491d

            SHA256

            7fc0c3be302552dd2b8ee42131ac1345d0f0b8436f9dc14b50f66e31482181e5

            SHA512

            e79340f9524e908888110a4b7a2814455cb87ad8881eaa0dd697a12184429ddf9c3d7c6c5b90378672e73803cb8f20f275c4e6b1da966d27eab4a1323ddebe5b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe

            Filesize

            1.1MB

            MD5

            5e72aa3ace4666f05941c02bdb58c1f9

            SHA1

            87feacd6a24de7dbc5760c5f1b6a7b7abb1b491d

            SHA256

            7fc0c3be302552dd2b8ee42131ac1345d0f0b8436f9dc14b50f66e31482181e5

            SHA512

            e79340f9524e908888110a4b7a2814455cb87ad8881eaa0dd697a12184429ddf9c3d7c6c5b90378672e73803cb8f20f275c4e6b1da966d27eab4a1323ddebe5b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe

            Filesize

            756KB

            MD5

            900bf09bed9bfa89388a927e53d8d0bb

            SHA1

            2874f11438d0371617797d686baaa63c6ae13a62

            SHA256

            4180ed8710c2d545d3741193d96cf7536549909bf622ce13734c58ac27798160

            SHA512

            6108678fc313dd5618e0dfc08914d9c354f19e8a7fcdacf6f6db999f3a87bb3044ad0529846df2cbbd7732997b6a848a20cb8c41ffa614003eaa6a3c6602d274

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe

            Filesize

            756KB

            MD5

            900bf09bed9bfa89388a927e53d8d0bb

            SHA1

            2874f11438d0371617797d686baaa63c6ae13a62

            SHA256

            4180ed8710c2d545d3741193d96cf7536549909bf622ce13734c58ac27798160

            SHA512

            6108678fc313dd5618e0dfc08914d9c354f19e8a7fcdacf6f6db999f3a87bb3044ad0529846df2cbbd7732997b6a848a20cb8c41ffa614003eaa6a3c6602d274

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe

            Filesize

            560KB

            MD5

            22ff88362f36d6adc4cbd0f08c20bce3

            SHA1

            16e8de480065e4c8ff59edbf8b495f818ef90a45

            SHA256

            27daf75b721c8a7590946f54ea50d767155e87de2e14759e4db4ec357ec41daa

            SHA512

            ae993b64ce8d4b7ad533e207ea0ac2e95f2c9cb1f02eb7e9257e14d22bcbfed99d0094a28a9b5e09e9d2dd683dadfa3469b92c0aebac5ceeec374bc286c82ba8

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe

            Filesize

            560KB

            MD5

            22ff88362f36d6adc4cbd0f08c20bce3

            SHA1

            16e8de480065e4c8ff59edbf8b495f818ef90a45

            SHA256

            27daf75b721c8a7590946f54ea50d767155e87de2e14759e4db4ec357ec41daa

            SHA512

            ae993b64ce8d4b7ad533e207ea0ac2e95f2c9cb1f02eb7e9257e14d22bcbfed99d0094a28a9b5e09e9d2dd683dadfa3469b92c0aebac5ceeec374bc286c82ba8

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe

            Filesize

            1.3MB

            MD5

            1a93ad650d6355515970820e7a986387

            SHA1

            73e04234dfc0494075da84123d817b8eb6fb3edb

            SHA256

            7307b955314202350aa41cb0a47389e999e178b47e08fa1cf10dc18427364a6e

            SHA512

            9d427a7c3becde59e0d6c50c5b9e980068a678be0b7c5b504f88bbd859b5f5b4afc25f74f14eb14c2b9064cd121705b1ab841a1a7439dd758a7a398d13cfc976

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vL5xR1xq.exe

            Filesize

            1.3MB

            MD5

            1a93ad650d6355515970820e7a986387

            SHA1

            73e04234dfc0494075da84123d817b8eb6fb3edb

            SHA256

            7307b955314202350aa41cb0a47389e999e178b47e08fa1cf10dc18427364a6e

            SHA512

            9d427a7c3becde59e0d6c50c5b9e980068a678be0b7c5b504f88bbd859b5f5b4afc25f74f14eb14c2b9064cd121705b1ab841a1a7439dd758a7a398d13cfc976

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe

            Filesize

            1.1MB

            MD5

            5e72aa3ace4666f05941c02bdb58c1f9

            SHA1

            87feacd6a24de7dbc5760c5f1b6a7b7abb1b491d

            SHA256

            7fc0c3be302552dd2b8ee42131ac1345d0f0b8436f9dc14b50f66e31482181e5

            SHA512

            e79340f9524e908888110a4b7a2814455cb87ad8881eaa0dd697a12184429ddf9c3d7c6c5b90378672e73803cb8f20f275c4e6b1da966d27eab4a1323ddebe5b

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zR2uH1sn.exe

            Filesize

            1.1MB

            MD5

            5e72aa3ace4666f05941c02bdb58c1f9

            SHA1

            87feacd6a24de7dbc5760c5f1b6a7b7abb1b491d

            SHA256

            7fc0c3be302552dd2b8ee42131ac1345d0f0b8436f9dc14b50f66e31482181e5

            SHA512

            e79340f9524e908888110a4b7a2814455cb87ad8881eaa0dd697a12184429ddf9c3d7c6c5b90378672e73803cb8f20f275c4e6b1da966d27eab4a1323ddebe5b

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe

            Filesize

            756KB

            MD5

            900bf09bed9bfa89388a927e53d8d0bb

            SHA1

            2874f11438d0371617797d686baaa63c6ae13a62

            SHA256

            4180ed8710c2d545d3741193d96cf7536549909bf622ce13734c58ac27798160

            SHA512

            6108678fc313dd5618e0dfc08914d9c354f19e8a7fcdacf6f6db999f3a87bb3044ad0529846df2cbbd7732997b6a848a20cb8c41ffa614003eaa6a3c6602d274

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Aq6rW4cA.exe

            Filesize

            756KB

            MD5

            900bf09bed9bfa89388a927e53d8d0bb

            SHA1

            2874f11438d0371617797d686baaa63c6ae13a62

            SHA256

            4180ed8710c2d545d3741193d96cf7536549909bf622ce13734c58ac27798160

            SHA512

            6108678fc313dd5618e0dfc08914d9c354f19e8a7fcdacf6f6db999f3a87bb3044ad0529846df2cbbd7732997b6a848a20cb8c41ffa614003eaa6a3c6602d274

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe

            Filesize

            560KB

            MD5

            22ff88362f36d6adc4cbd0f08c20bce3

            SHA1

            16e8de480065e4c8ff59edbf8b495f818ef90a45

            SHA256

            27daf75b721c8a7590946f54ea50d767155e87de2e14759e4db4ec357ec41daa

            SHA512

            ae993b64ce8d4b7ad533e207ea0ac2e95f2c9cb1f02eb7e9257e14d22bcbfed99d0094a28a9b5e09e9d2dd683dadfa3469b92c0aebac5ceeec374bc286c82ba8

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\Jj4Oe0PV.exe

            Filesize

            560KB

            MD5

            22ff88362f36d6adc4cbd0f08c20bce3

            SHA1

            16e8de480065e4c8ff59edbf8b495f818ef90a45

            SHA256

            27daf75b721c8a7590946f54ea50d767155e87de2e14759e4db4ec357ec41daa

            SHA512

            ae993b64ce8d4b7ad533e207ea0ac2e95f2c9cb1f02eb7e9257e14d22bcbfed99d0094a28a9b5e09e9d2dd683dadfa3469b92c0aebac5ceeec374bc286c82ba8

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • \Users\Admin\AppData\Local\Temp\IXP004.TMP\1nu41Gr5.exe

            Filesize

            1.1MB

            MD5

            9c59c3e05d943e60c2051eaa0b0a0e9e

            SHA1

            6dab54b30729ce1d18b32ab35944c5235f4ce66b

            SHA256

            44149ca5b41eaf0f65d7b2e873610f73dde8ac6ed48bc4b6e783125ab9823938

            SHA512

            4ac709438112607a75e47a34eb340cd9c1fbdf57f1fc6d447f502e98d3a14b754ae0e5ebe1cf19589c536058ee9eca3d0f4559c3f901a0fa23fd02e77c43391a

          • memory/2544-55-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-59-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2544-61-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-63-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-65-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-58-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-57-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-56-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2544-53-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB