Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 18:25

General

  • Target

    0bab740a74196ff8f7ccf174abbccc2f.exe

  • Size

    699KB

  • MD5

    0bab740a74196ff8f7ccf174abbccc2f

  • SHA1

    8db66b529fdb58dc193efda917b1bafa1bd09372

  • SHA256

    76d273786d7b40330741de1ff324cb1814fd56f539a3a914a89e8dc9c9a838e8

  • SHA512

    e3a40b2729fb0c6ed9158a5cc2c55718ea62012b6badcae0383819fa9775268a792b326cb0b30e808bc7ad8df9a58ec7e5cdc95c79cac63e4719986561909c88

  • SSDEEP

    12288:5na9UiT1nZeco1ujA7mntBnz41dtcvS38LCJQBtdGs1rBLsJ:5naqk3eco+Nj0XkS3rJQBtUkBgJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe
    "C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\is-1KFH1.tmp\0bab740a74196ff8f7ccf174abbccc2f.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-1KFH1.tmp\0bab740a74196ff8f7ccf174abbccc2f.tmp" /SL5="$40110,391208,54272,C:\Users\Admin\AppData\Local\Temp\0bab740a74196ff8f7ccf174abbccc2f.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2404

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-1KFH1.tmp\0bab740a74196ff8f7ccf174abbccc2f.tmp

          Filesize

          2KB

          MD5

          00c2d81954e5beb5ae18b558fdfe4aa4

          SHA1

          84b2bacaf92eb44b709251ddb1900dfbf428a838

          SHA256

          5af945fca2007052746943b522ca8db0d867b50188f4e5d79efdb16292e95214

          SHA512

          5aae8c3d4eb12bfcd896b6c7b9a39f94051d14933806f24183c693e3316f0f13f0c1cdedfc42f3119e9e93b8d70f2e051200cffb09894fa463635bbf32dd02fe

        • C:\Users\Admin\AppData\Local\Temp\is-KR8LR.tmp\Games.inf

          Filesize

          227B

          MD5

          8c06a9539331018aad17acc39146ccc4

          SHA1

          cb48146f36dc1fd3b7bd23f345868191fbbd444a

          SHA256

          a1e2218effdd91dd157f9085acbca3cf289d5b3af13c347830b43e96d7cd5b0e

          SHA512

          063213cd2a4e2394dc266fb3a8813d34efec3af3e404c6f269f9796c52c4756fad7b2d6afb4d3c535cf8b15e6aa381c54d6fd9933a3bcc25d1e1f4e52f4fc2f9

        • \Users\Admin\AppData\Local\Temp\is-KR8LR.tmp\_isetup\_shfoldr.dll

          Filesize

          14KB

          MD5

          155c977bc7375776a23c84b59a7240d6

          SHA1

          d139f1466e704cb034aa71df41d8472e217c7de3

          SHA256

          65e0e96842c23ced8121f2adfc484a6380028a517f8fc2b9acc58a8bdc94d8d0

          SHA512

          3f0b8f6506f9311bcb2bd2c0cb58076be00279fc7ada5461385111fbc691e58056185fb4cd2b92cee40dc8cbbcdc6993024f9a1ddd6c9a429dfa6a4f2be63dc8

        • \Users\Admin\AppData\Local\Temp\is-KR8LR.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-KR8LR.tmp\isxdl.dll

          Filesize

          49KB

          MD5

          02ecc74f7f91e9ffd84de708683236a6

          SHA1

          3532de0b77df8b0fc89e9c7eddec3fa71f98f5a2

          SHA256

          30ad8a0e1cee091ca48c771adb2e76baf1a7d54b9f60dc47f54dfdc2d6f6691e

          SHA512

          a3fdaa651f82428395bc412a2a04fce673768d3ef088b3748addf337d95464eb141ae7c286bff5c705eae05dd7b38207629588ae7e89ada15269463cd7acf541

        • \Users\Admin\AppData\Local\Temp\is-KR8LR.tmp\itdownload.dll

          Filesize

          27KB

          MD5

          85e430d7f94a89d1ad012efb3c82e6da

          SHA1

          d041e16edf32c783d96c3785de305b60eaf63d65

          SHA256

          9a4f5248323eded4b992de90edf0c4afd02deb8b8eec9c21b24229f714120d11

          SHA512

          483e57a181994939863b98b5b05ce69230c095e9dd83090a544f9db7c0a6aa336376ecc8089637ee50f8537e6d07338f2591a83fd750756446a2e7cdef79781d

        • memory/1708-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1708-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1708-35-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2404-18-0x0000000002030000-0x000000000206C000-memory.dmp

          Filesize

          240KB

        • memory/2404-8-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB

        • memory/2404-37-0x0000000002030000-0x000000000206C000-memory.dmp

          Filesize

          240KB

        • memory/2404-36-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/2404-41-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB