Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 03:28

General

  • Target

    e5690a8e839af5a15f62479904bac715.exe

  • Size

    21.0MB

  • MD5

    e5690a8e839af5a15f62479904bac715

  • SHA1

    b038134b11d60c6e632b2729cd9ce5f66a44fc7e

  • SHA256

    2227bb798733125421fc8a93bfb78f24f4b68b4724725a0fff6663bd603a761f

  • SHA512

    3c235b6af8c3a8b0c5b2247884f659e731d9d0b515c192022adb2e8c78039bd6f9092ffe6289c68fe75ecbf471ed46cf2f956cc4884727711816728623631b2a

  • SSDEEP

    393216:lET5w65//ksUKm8532ojxacduND+qUC97zbH4xpLi4NL6R2Wi:lg5zhksUKm8532oNac/qUS7z8pLiimgf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe
    "C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp" /SL5="$4010A,21129340,887296,C:\Users\Admin\AppData\Local\Temp\e5690a8e839af5a15f62479904bac715.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2580

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp

          Filesize

          1.3MB

          MD5

          f8c0ca79fdebd0f554ec8b1e3aedb4ae

          SHA1

          31dcf57e2138bc0c31b927aa6c28078dab07c5e6

          SHA256

          606571ab4da30bfc2acfb12aebfd8c04ba61cf21042491a154186eb08e205c62

          SHA512

          5d982d79f351b8f0614d920263eb7c767658a27a479f5ecdb2b7e0fd35e1a8c1eab41e9f1e54303aee579d4d3b48ed65de1f048d8ef8c994bb6e688176515045

        • \Users\Admin\AppData\Local\Temp\is-7MM28.tmp\e5690a8e839af5a15f62479904bac715.tmp

          Filesize

          1.7MB

          MD5

          45ec1a88dd7beabb5a89b992c4d7a1f8

          SHA1

          04fcfb67f71bfb27a677b66395819576f553302b

          SHA256

          8553cb475f285c3cb3cb00a69665dc79e2af69b03f28a352fd094bda69920f8e

          SHA512

          94d8b760486a31fed2a3fa9224c3b27f15616b6a787007f80cbe4519e456f9ea3caf39efdd536b34c9ef02c7d64a470aec74689c29c8a0b6dff3caa8b69b9983

        • memory/1232-0-0x0000000000400000-0x00000000004E6000-memory.dmp

          Filesize

          920KB

        • memory/1232-9-0x0000000000400000-0x00000000004E6000-memory.dmp

          Filesize

          920KB

        • memory/2580-7-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2580-10-0x0000000000400000-0x0000000000722000-memory.dmp

          Filesize

          3.1MB

        • memory/2580-13-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB