Analysis

  • max time kernel
    196s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:01

General

  • Target

    3665449cc4aab55aef2904e69f5df371.exe

  • Size

    579KB

  • MD5

    3665449cc4aab55aef2904e69f5df371

  • SHA1

    b96ddd1e196f66e7c6c263da2ec1f888b555a4ce

  • SHA256

    2303fcba85210755e560e027e3a9c958f2dbd62a1fb2112d2f4d642237221134

  • SHA512

    011f76db17ab2fa2953c32683fc880382f8bc72c1c0dc2da92efa16eedf341f6fa12135871a957e1d0a2069f8dd3a8adffca79adafc28375cb344d88129bc0ea

  • SSDEEP

    12288:dSZDU5qQkyP+EWkH9L2JnT8DMhHTOpR6iWyrj:dSZsRkop/HR2JISHTOLtWi

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3665449cc4aab55aef2904e69f5df371.exe
    "C:\Users\Admin\AppData\Local\Temp\3665449cc4aab55aef2904e69f5df371.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\3665449cc4aab55aef2904e69f5df371.exe
      "C:\Users\Admin\AppData\Local\Temp\3665449cc4aab55aef2904e69f5df371.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 124
        3⤵
        • Program crash
        PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\readme.eml

    Filesize

    14KB

    MD5

    0005608d1d7f20a99820d975c274423e

    SHA1

    21b443de0b2e04922069ec65debeef9d7ceb45eb

    SHA256

    6b55e82b2508c93b2097b62996ff1f708af487f190d50505ce8dc5b068a38d1d

    SHA512

    d91181b3b9a46ffbb67989a20a9292564bc0cffa754edf4cbcc27c739d4fac292d54fb25881b9f80878876dccfb0326baf0b06bba54561f7e01ac55f51e4714e

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    8156706568e77846b7bfbcc091c6ffeb

    SHA1

    792aa0db64f517520ee8f745bee71152532fe4d2

    SHA256

    5e19cfbd6690649d3349e585472385186d99f56a94dc32d9073b83011cea85f8

    SHA512

    8760f26069296f0fe09532f1244d93a57db4cafa8d06aaa9dc981bcaed4bde05366ef21e6f0c1aadad4478382b59a4e43d26c04185cf2ed965901321d05604b8

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    7757fe48a0974cb625e89012c92cc995

    SHA1

    e4684021f14053c3f9526070dc687ff125251162

    SHA256

    c0a8aa811a50c9b592c8f7987c016e178c732d7ebfd11aa985a8f0480539fa03

    SHA512

    b3d4838b59f525078542e7ebbf77300d6f94e13b0bff1c9a2c5b44a66b89310a2593815703f9571565c18b0cdeb84e9e48432208aaa25dff9d2223722902d526

  • C:\Windows\SysWOW64\runouce.exe

    Filesize

    10KB

    MD5

    e1beaaa9e4b3267b7787667f7a04bc47

    SHA1

    bad50c9da70bcaa74ced845b486ac6f0414682de

    SHA256

    0fbb61573d9b8b1792a352fbcb227042f32c9f035012c9f203dce0be4f8f5288

    SHA512

    da58fcca7e640b8026bc9071c4cd13958ec8dc0cf5ca38644573e2266edc8b43f2d49cb3e3d444388af75b46ec9bb63910b4cc01f50aceb697cdbe5aa9bbade9

  • memory/980-2-0x0000000000FF0000-0x0000000001085000-memory.dmp

    Filesize

    596KB

  • memory/2076-0-0x0000000000FF0000-0x0000000001085000-memory.dmp

    Filesize

    596KB

  • memory/2076-1-0x0000000000FF0000-0x0000000001085000-memory.dmp

    Filesize

    596KB

  • memory/2868-4-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/2868-5-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/2868-6-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB