Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 06:09

General

  • Target

    0a8e65395ea7bf8477b8a6147b00aabd.exe

  • Size

    209KB

  • MD5

    0a8e65395ea7bf8477b8a6147b00aabd

  • SHA1

    4a408eb263019a9a09c10191a7cb7f52d2801d11

  • SHA256

    dc4cadacea684d8293d14e8d178abd2917f5800d1d777bd2c3db891d2a70c403

  • SHA512

    56dc23f2723f1170065ea9994565cfce09e917b775011de5b9e1ef59b26dc8773baf907f45c5520985795da1448bf4abadea6b3bedd463b50988b38f5c112b50

  • SSDEEP

    6144:WlH4wMSv66OF5ol0ud3a2ymTsO9xeIEUTp2:eJBsF5M7ymTskVp2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8e65395ea7bf8477b8a6147b00aabd.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8e65395ea7bf8477b8a6147b00aabd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ED0.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 0a8e65395ea7bf8477b8a6147b00aabd.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2168
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:2532
        • C:\Users\Admin\AppData\Local\Temp\u.dll
          u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2832
    • C:\Users\Admin\AppData\Local\Temp\2A7A.tmp\mpress.exe
      "C:\Users\Admin\AppData\Local\Temp\2A7A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe2A7B.tmp"
      1⤵
      • Executes dropped EXE
      PID:2752

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2A7A.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • C:\Users\Admin\AppData\Local\Temp\ED0.tmp\vir.bat

            Filesize

            1KB

            MD5

            11ff20784bff8d994c01076b6d748ab4

            SHA1

            d0b82ad96302fb29ba77bd13c0c22386a40c2840

            SHA256

            61affb303bd5340c2ff65359b47bc7680693400e72dcffc2c6b29e725896bb1f

            SHA512

            31ac474061d0b437f1828243c63cb218218d6d6ee226df97f09e7cac63fc65ee7405d2d8498615c61d45857d11d5c4aa31effb69250e56db584308a60043c292

          • C:\Users\Admin\AppData\Local\Temp\exe2A7B.tmp

            Filesize

            41KB

            MD5

            5a16fb75977e1799ed52f35a164922e6

            SHA1

            c1697c61c42498f0501a886392ddd2560646b24c

            SHA256

            f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de

            SHA512

            1e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216

          • C:\Users\Admin\AppData\Local\Temp\s.dll

            Filesize

            700KB

            MD5

            863c312b1e74b57dc2d01a1370684ff3

            SHA1

            39175536b2783f4b3d70cb29d3352388cfebbcac

            SHA256

            33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

            SHA512

            d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            73615bb4ea7c2ff6814e2570ae45c43c

            SHA1

            46cabb935593f06f5a925df8f320f5df1260ddbb

            SHA256

            7710bdc3ad221d6aa9827ce72c0f6bbd41f8726256a224519743a4e1a19d6b98

            SHA512

            684a597765396a5b9292ee191f1ec70723a66b9c1e6519e04e6d6813023d59b9104b59b60d7144d962ef75b7c434c97c7bdc2684481fd8ed828fb1cf12ba7588

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            697873da0a6ab4aa236a2be7e6de0a02

            SHA1

            108184af36bcbb4164b0dd9c4f2afac5d1647687

            SHA256

            b597cd214bdb62ba186f6463ceecd3d1205bc10ab3a425eca5f0e9a9d6acde73

            SHA512

            957cb9457917e8afdb4133ec687b919087b402e35d1476075eeb06c02f12f7130fb9fbfa226d98215891c62496c22c82ee9332ec6c9fae384ad80dd5bb79a8e0

          • memory/2196-0-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2196-112-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2752-98-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2752-103-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2832-96-0x0000000000300000-0x0000000000334000-memory.dmp

            Filesize

            208KB

          • memory/2832-95-0x0000000000300000-0x0000000000334000-memory.dmp

            Filesize

            208KB