Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 20:21

General

  • Target

    vrz9hacoe.exe

  • Size

    72KB

  • MD5

    7be69929b9bc407cfb09f140b288c6c5

  • SHA1

    e4620d3828ebd8f588caf0652cdaef0b09b231d8

  • SHA256

    23a8378699f5bb925b32c7124f62468886bf3ce39a9feec1857a446de55f36ce

  • SHA512

    1209ee4b19043b02e94728635b60a84f47542a6c0ae18f8fa0d76a20e3726d2f0ccde50a8dec7fba1398cf836543097621e7700089d9b72edb38ee0253818161

  • SSDEEP

    768:zYnI9ZvPg2k4u+hJDdv260OAhAH4Ii7gLp6uqcl2aauA:zwIrHuCtd3FAhAYIi7Glba

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe
    "C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Roaming\29dk54n4c.exe
      C:\Users\Admin\AppData\Roaming\29dk54n4c.exe
      2⤵
      • Executes dropped EXE
      PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\29dk54n4c.exe

    Filesize

    72KB

    MD5

    6738a4c55b8be6825517717db7aaa36f

    SHA1

    9d380d42c57de287d2f206767ec878187dafa1e5

    SHA256

    b1a1bdb0862d456c0981d8885298c866ad42bae198e043730f20dc4bdd0a294e

    SHA512

    40390d78cd97bdd54d564cd89daf539cfc8a66bc5a73aea83d876afd36dfd6e378b90422f086207fddd1b1c11fe9b2c289e3d29305ab71c412b06440dff2e6fe