Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 16:29

General

  • Target

    7cc1b53a16f78080dbc622b80ad5a814.exe

  • Size

    209KB

  • MD5

    7cc1b53a16f78080dbc622b80ad5a814

  • SHA1

    c47ba1aedaca8f4bfb2864ea9fcba321a0d67bc5

  • SHA256

    a1c0c1bca1f56567797177345c32e0aeebf119c6795535364b19abd0c2908d28

  • SHA512

    a9078e7ba0e60d97372f0015bd12119791b27036d0a5a7bfc746e918c4f708f67f9f6032150411f14f6ca49b3bd8be6d4a5666b529ca724c4fd984dd20b8096c

  • SSDEEP

    3072:nldVutUYVsmgqisE8R7BD1pKuwlutkNhFnOWc71W64SvNIambRi2sf:nldVuZJisPxpRsP1chbIam1i22

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cc1b53a16f78080dbc622b80ad5a814.exe
    "C:\Users\Admin\AppData\Local\Temp\7cc1b53a16f78080dbc622b80ad5a814.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 7cc1b53a16f78080dbc622b80ad5a814.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2740
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\87D5.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\87D5.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe87E6.tmp"
          4⤵
          • Executes dropped EXE
          PID:1900
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:3052

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat

      Filesize

      1KB

      MD5

      cb59c003810181c53a41db6ebb09a0ad

      SHA1

      089a11ad474080dc37de4f0d3b06bc51a7ddab5f

      SHA256

      79f424285f16d0dfbbc0c2db1f5e729f362acfb6ff04679cee140f89e8abe2c0

      SHA512

      4332ddf620cc6562512e8bdde755ac56966802a8c9c1bf7b776d49e1d3c66a96fe5af73e8c44acb137c218adf790508627242be4c16565fe7d993828fcf7527f

    • C:\Users\Admin\AppData\Local\Temp\exe87E6.tmp

      Filesize

      41KB

      MD5

      2962dfcac22070e3da981e1115397938

      SHA1

      09a2ddd77cc9265c1c9a3a0b3797ea5007e3bd28

      SHA256

      d47a5a1f144a7b1a0267ec604f18238419a29402b4ef51f1b2165f346ef88951

      SHA512

      8efe28ee9ba694a2cc010bb61736de3f7bc190c3656f814a700e9992391a174982fa21f16d24ce1c36876e095f1a76569183cee52048ae22102cac621beb422a

    • C:\Users\Admin\AppData\Local\Temp\exe87E6.tmp

      Filesize

      25KB

      MD5

      71a7a87a087b9c4439a66567699e7955

      SHA1

      c576142751355178982213df42ea184f5cc17cbe

      SHA256

      a14e2395b8aee936c01c67199afb45946c1264631812010549498e9921f08194

      SHA512

      54f9d9784acbe05c476928f1dc2514dbb1032c8ba404d572ea85960f12fe3c0beb3ab62ce7c47b0c64df509070672c4a70f3e36168cef8458124402d8024ecf9

    • C:\Users\Admin\AppData\Local\Temp\exe87E6.tmp

      Filesize

      41KB

      MD5

      683584ad934560df98467d0c3a0e9b94

      SHA1

      2e1f3f885a8dfb8f67068a5f40000538b96b28a7

      SHA256

      99df656183a4afe15c02a6c9ac1f23a8ed26c7733ba8476d32432d18f7f5c6fd

      SHA512

      c1202a0fecb5eb7246c8f7b6909a41d234e67afa673d22f11d011059f05c08fdc5b069d3fea02960cec486e5f04eca5e58222f859d485a27d8f933f510acc285

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      700KB

      MD5

      03e84bf7ea2eba6e881e868ceefe2526

      SHA1

      09019ed20cf16847a264f5d1840ee0802f1778a6

      SHA256

      8b16836b18106d0e8fdbb4b26beefee04479fe219a59cc2a186b68db91fcd832

      SHA512

      32a47a7b4725f2d71573ad855b0a3bc99b3fa86d70f7b1b60456361bbcd03d37ea58f2b7092c0b6993e156db4ddd66b1d544363523f580a6dd8c055697ec2026

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      e53e6d017028a88f71f30ed25a84297d

      SHA1

      3fb6014c8e6a87340ffd738ade80489809e6538b

      SHA256

      b8482e93e4e04708d382aa9bf309d9824faee01c20a712bbdb75e4dce0ea5a93

      SHA512

      72b3074d070016ceacd3127059ca9e6672475cbbdccef5bd4a15016c0633f4edb8204bd025effc24dad76a7ba064c688ef016c604c8c32676feaf5c77baa686b

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      95f41e332e411d3acafb465926664001

      SHA1

      de33555a7cfea9b5b190243293342cba5b34ef44

      SHA256

      c3e2321fba1a85b64d635b60b13a56ac3dff427277106d9dc339143ee26048af

      SHA512

      4b4ed72b9cb7a12ba59c7b33c1f134b25663e96795a0de40591879cf55400923f2515c1debf8312b3ecf72e600d7d731095ac6621fb94fe9ffe6a63592928dd7

    • \Users\Admin\AppData\Local\Temp\87D5.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • memory/1900-96-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1900-102-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2184-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2184-113-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2748-94-0x0000000001DE0000-0x0000000001E14000-memory.dmp

      Filesize

      208KB

    • memory/2748-91-0x0000000001DE0000-0x0000000001E14000-memory.dmp

      Filesize

      208KB