Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2023 07:08

General

  • Target

    7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe

  • Size

    816KB

  • MD5

    724201ceec6e60e76435b1dd45f654d3

  • SHA1

    6550ac7877ef90d834e4f26a82577ee9afacf9b4

  • SHA256

    7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b

  • SHA512

    073f6f6d2dec492da85434cc28d6e8a5fd47e4786b8dd4fbee2ef91c00aed8ba3207231e63f54a2f190741d1ff589834b68a1de5cb413b71efc24681a0a02c83

  • SSDEEP

    24576:vY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG90:A3XZynV4oDabuWbDQOcIxJJ90

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
    "C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe
      C:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:2540

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe

    Filesize

    816KB

    MD5

    13ac0dc5ee721400f9d722bf8e1ceb8c

    SHA1

    c2e8afe3c0b21592a018c061fbe286758476343e

    SHA256

    9ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912

    SHA512

    17903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d

  • C:\Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe

    Filesize

    816KB

    MD5

    13ac0dc5ee721400f9d722bf8e1ceb8c

    SHA1

    c2e8afe3c0b21592a018c061fbe286758476343e

    SHA256

    9ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912

    SHA512

    17903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d

  • \Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe

    Filesize

    816KB

    MD5

    13ac0dc5ee721400f9d722bf8e1ceb8c

    SHA1

    c2e8afe3c0b21592a018c061fbe286758476343e

    SHA256

    9ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912

    SHA512

    17903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d

  • \Users\Admin\AppData\Local\Temp\1F0C0A0E120E156F155B15F0D0E160D0C160E.exe

    Filesize

    816KB

    MD5

    13ac0dc5ee721400f9d722bf8e1ceb8c

    SHA1

    c2e8afe3c0b21592a018c061fbe286758476343e

    SHA256

    9ec70a77f0e97d769a054b37c8468dfe4a6e41dc53ac876b35dc9cfe693cc912

    SHA512

    17903097be6f4cdffba03ea20ca6a821baab4d8b76e848a15c36d79dfea393524611d4bfedad8ce51866a89cd726a5fc77c6683272c7a516fbac96e8554d2a8d

  • memory/2540-14-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2540-15-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2540-13-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2564-0-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2564-2-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB

  • memory/2564-11-0x0000000000400000-0x00000000005AD000-memory.dmp

    Filesize

    1.7MB