Analysis

  • max time kernel
    24s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 20:39

General

  • Target

    117df22c3509702a54a9f97fcd27768d.exe

  • Size

    639KB

  • MD5

    117df22c3509702a54a9f97fcd27768d

  • SHA1

    a55b02758e00d26b6d9ee0966fb45362d9ee78f9

  • SHA256

    19bc1945cca25fdefe121544a0e3f36e727fe2b219ec270bbf2ebfef4dc632e1

  • SHA512

    c2659261b54b1aa2e23ed295c18f1d9570ee2aadaeb6c5962d7275946772737c38821f92e78298a1243ac956c817a5dcfb996d7b03761c9caaecba2263a3e7d6

  • SSDEEP

    12288:7w4ub21OBjYGRaJQagcBIzZn3OEXlI/4okHd3hLH9tf0RVah:ULb2lGRFdp3+kHdldtmVah

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe
    "C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Users\Admin\AppData\Local\Temp\n6638\s6638.exe
      "C:\Users\Admin\AppData\Local\Temp\n6638\s6638.exe" a299da864c2a1171319ffd1emTWQTctauAIoAJqmDVVhMt0HlwnsyTuGYN6Vrz1oy0DIQ7Ojrgcac8ksaha8V1OWLQ0L6XeB4ek4aZzo9tYCYFOwus/nFN7w5KafogBQ63riZLdcn5OAwliCM+uohWMS3wHZMm1k62HYxWrtwTdrhuq7czHGlonxrs3PWw== /v "C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe" /a
      2⤵
      • Executes dropped EXE
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d37af0f1354e7891510429b6b743f1d4

    SHA1

    cd569aa177fe3ea3fcf72f6772d1d917748ce892

    SHA256

    d22d5faf3cc5f4d5f32e4918efabd6e419cbcf817106db206cc909a78e6c8d8e

    SHA512

    58533a8ae94c6d3634b8b15354ae55fa9d924d2fd7d7d85ca6de4bec9a68c356037cf134d55fcea1df05aa008a0aadec2e463c139c19d391d4f429223bfb4848

  • C:\Users\Admin\AppData\Local\Temp\Tar5EF7.tmp

    Filesize

    71KB

    MD5

    a8a778569b2698c693e49d2a1d0365dd

    SHA1

    5be6d6760d5ea71286d2a2aac0d3c8223e28c02c

    SHA256

    6baad5aaf86bf3b24282d9de2ef6082b95ee9c5d14397afc35d22b9cc470cae6

    SHA512

    d0ea448894fb4ecb909abc0f11c72907b3f90279358b946d27ae307fcba2898d1bbf7d1a1ed50d6d687f6afa6775b84df8f70588e44d944cd3664aec8bcc1fb0

  • \Users\Admin\AppData\Local\Temp\n6638\s6638.exe

    Filesize

    351KB

    MD5

    efbfdf1fc17841c857024c99eefe4711

    SHA1

    368bbca1e13b869e3daa63eedf1630c0a418e472

    SHA256

    77e44b6cf973c1b5e70889954dd449baf943d4bfa31a659fb149cf2e93ebd437

    SHA512

    5e5306bbc20439bb73ab63c472a720c3401805e5f3b3737d461e7c8f592eec478550521e1007c5f3c24740f1afc242698d91ac68d8d686c28292a0a37185e1d5

  • memory/2984-156-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-157-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-29-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

    Filesize

    9.6MB

  • memory/2984-16-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-155-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/2984-15-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

    Filesize

    9.6MB

  • memory/2984-158-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-30-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-159-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-161-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-160-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-162-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-163-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-164-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-166-0x0000000000950000-0x00000000009D0000-memory.dmp

    Filesize

    512KB

  • memory/2984-165-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp

    Filesize

    9.6MB