Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 22:16

General

  • Target

    3f79a494bf65e4627d087242e3a59f82.exe

  • Size

    673KB

  • MD5

    3f79a494bf65e4627d087242e3a59f82

  • SHA1

    9635e071f8271f28591d19961ff8e386f5397eb9

  • SHA256

    5f8386775e403adaa5f52e9e36003269a1d4e8cbf11bb2a4fc396728ac74a526

  • SHA512

    8db4e4b486d90493db7c0942a3ccb3592f7cd56ae8fd0b78791b2a1c5963eeedf29fc458f3de13d4f7e0dbb0527751225f27569df02f97519c9d4a4a15e8a4c9

  • SSDEEP

    12288:hDAtd5nBPtggVJOgIaQRs9sH36pmMI5FOcIfccGIFU49Z1swi1yUdPn7gJ2PUZ4:O/B/JZ/z9sX6gMEk33JRX1hib97gOX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe
    "C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\sxe77FF.tmp
      "C:\Users\Admin\AppData\Local\Temp\sxe77FF.tmp"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\sxe77DE.tmp

    Filesize

    15KB

    MD5

    bd815b61f9948f93aface4033fbb4423

    SHA1

    b5391484009b39053fc8b1bba63d444969bafcfa

    SHA256

    b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76

    SHA512

    a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71

  • \Users\Admin\AppData\Local\Temp\sxe77FF.tmp

    Filesize

    4.0MB

    MD5

    e6a34fdce98096428100d97ce39f8a98

    SHA1

    ec192501fe72a3c1af5d5a76fda6235087642941

    SHA256

    7cc96695d0386a16759d4ff1c67892d99f91806e789b1e745cfdfe60759481de

    SHA512

    7ae7c4b5c0999320046b3eb7140a4f470f1fff6d55012e983f00d5976f1b67091b693bedaf50b888317e82eb092e91a6d1ffc16880ad8a90f7bbca512fb34bb1

  • memory/2232-17-0x0000000000400000-0x0000000000802000-memory.dmp

    Filesize

    4.0MB