Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 22:12

General

  • Target

    fbe27ad7251d741049e461c5cd248961.exe

  • Size

    208KB

  • MD5

    fbe27ad7251d741049e461c5cd248961

  • SHA1

    0ccc82eab7d1494150c7d933431c5234f37aa09d

  • SHA256

    3acd37405fd412651f315fed6d1df265f0c606c81f299fbff3a72710e37cab9d

  • SHA512

    523487aa22161c443777a28c6f7fa3511aa470d75c7a1f321b4f5120e27857d3b506d52fd5aa38403303492cf664eb117ce3635275b98d6298e1a7398213b8e6

  • SSDEEP

    6144:TlGRgXm15iDjfqssrSVR6AFVmpP7lnn1y:8v1SqixFsJlnn1y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\C6F.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save fbe27ad7251d741049e461c5cd248961.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2440
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Local\Temp\2839.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\2839.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe283A.tmp"
          4⤵
          • Executes dropped EXE
          PID:2548
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:1984

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2839.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • C:\Users\Admin\AppData\Local\Temp\C6F.tmp\vir.bat

      Filesize

      1KB

      MD5

      80c68fbc8cf69c5887423b76dfdbf821

      SHA1

      4bb5d634c4db876cdd7117e8ed33a885ca5621e1

      SHA256

      f227b981e47fd6ad79a07350f5cde808697eee8c57b6f8e1ce3c26a93c068ee2

      SHA512

      c9fa9b499cdad8e1933ff10eca448c6ba5e8839212449ea8fbeba54d576ad2be403f7dad0632342c88735f0931d539a05a37f7019a86bb14ac2703c4574873ed

    • C:\Users\Admin\AppData\Local\Temp\exe283A.tmp

      Filesize

      41KB

      MD5

      4d1c4e637e66e3aee050194ee149b1ae

      SHA1

      542aab9bf825e8cbb8afc946b8fe555ea402a413

      SHA256

      ba3591ba0a42bd2556af093af3beb685383b239570a459d00ad9ff0747851e25

      SHA512

      801010a3a79285d26a7ecd84928b7e24de7adab6ad67d2d2ebc81a5639a6b9ea9f0f5cb087e1dfbda5a9cfa031bc2f1798f18d688a7cfc600cb9cde670862011

    • C:\Users\Admin\AppData\Local\Temp\exe283A.tmp

      Filesize

      25KB

      MD5

      d19ab94a86e4c992930d7f585339e982

      SHA1

      aaa1aff3c3df7d9c34953572a907fd72353f66b9

      SHA256

      c719871d8ed6ea83bcac40347bd01e141f79a05f67893027fa96d3c874662c1f

      SHA512

      a859740f28a70bd2ec4ddd551571cfcc2f5f59db9236b9a716b0f236502b794d2e0c8e9e5bb592769147bf08117ae1759ec19f4deaef9a42a6635530bc89edc1

    • C:\Users\Admin\AppData\Local\Temp\exe283A.tmp

      Filesize

      41KB

      MD5

      1bac1e68caa8b23d9184cccea5a53ea0

      SHA1

      fb5975bd115ce664edb0dbffc40b31658db27ecb

      SHA256

      0cc9c7bc2b253b169ea4d05eed4b83ec4eb9cd5b7c7cdcdd24b3d0807e818c53

      SHA512

      40cbdef12fe81b6328a080b6f2d92bb65f02062783449bbd0c9646da1b304465c2243835d93c6add8832d1572d4ae69dac4773fa6b29b9af7cacccaebeb08288

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      700KB

      MD5

      e52e1dacca253a95205caebdf9ba61be

      SHA1

      89b934078b0ebb6045bcc17eee3395fc3af688ca

      SHA256

      bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621

      SHA512

      98cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      6cbca4829bb07836da4cfb00d0bcd3e1

      SHA1

      0fd4158ce8b42ae5a4f46b00d83a186c9fafd3c1

      SHA256

      e349073597d81ea36c97382be0f901004daef692caa2ed26bc0d187740ca91db

      SHA512

      38726f31513570ef51a822f43a72bf94ce7956221520c629b7906d93a541dd0f5e8906837a634fcba6bd26243dce11677b1704fdeaa3b1f44757dc586892971f

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      9c956e30a6906c5a371c9d5b2aeb48b0

      SHA1

      e055e78ef2667983b1c4e28c47586a1487fa2284

      SHA256

      9f0f7a8a74ec8160b0649b8450a4aa327ef120c91a09c871e376b8ed4bef5d4c

      SHA512

      05fbf040dc0ee64058e75299f1bb8b1144a63e8515cc4aebb1799c20ab1b29399342880742dbd8127ea25b24e97223388ba9b8217af04de8c7698bb24fbb615c

    • memory/2172-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2172-111-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2548-95-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2548-101-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2824-94-0x00000000004E0000-0x0000000000514000-memory.dmp

      Filesize

      208KB