Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:33

General

  • Target

    05b52e140a2ad13e0941f917b537dff3.exe

  • Size

    209KB

  • MD5

    05b52e140a2ad13e0941f917b537dff3

  • SHA1

    c96936d0521cc248d6a65ca05c79e36444e58545

  • SHA256

    e9538d759a3eb323bd74736c5a3f002f371048e131a4fbfc5fb91ecd29438ed7

  • SHA512

    53cffbfc2bf9e50ade58d005f618308808d1493220b1523228c707047c38b53e51db41f468a3318fb065badf0c581065195bfa74d70e2957af8af24f8ecd2914

  • SSDEEP

    6144:vlKiQ9xysISXcE645G4hKf1lMa98TB1rOl4K4ikOd:wbryREn5768rO+ik

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\u.dll
    u.dll -bat vir.bat -save 05b52e140a2ad13e0941f917b537dff3.exe.com -include s.dll -overwrite -nodelete
    1⤵
    • Executes dropped EXE
    PID:2792
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\ADA.tmp\vir.bat""
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\u.dll
      u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\26F1.tmp\mpress.exe
        "C:\Users\Admin\AppData\Local\Temp\26F1.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe26F2.tmp"
        3⤵
        • Executes dropped EXE
        PID:2876
    • C:\Windows\SysWOW64\calc.exe
      CALC.EXE
      2⤵
        PID:292
    • C:\Users\Admin\AppData\Local\Temp\05b52e140a2ad13e0941f917b537dff3.exe
      "C:\Users\Admin\AppData\Local\Temp\05b52e140a2ad13e0941f917b537dff3.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2500

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\26F1.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • C:\Users\Admin\AppData\Local\Temp\ADA.tmp\vir.bat

      Filesize

      2KB

      MD5

      78ce3a04668b238b2f7fd442154204e7

      SHA1

      ce9ce456e68bd006521ec2764cb044c30021db08

      SHA256

      2535b506ad1eaba13ffe2bfffa3d84e2f063fb624db7f296341583350c553aaf

      SHA512

      210e6db0443f0a22c5c703aae0bf9ecf40473546fed8b2c9b4cbe0d84cc361fc8f0945c82c40bc77d3db53f95f40240dd0b3d72f81e05ab34b9efaf817dac047

    • C:\Users\Admin\AppData\Local\Temp\exe26F2.tmp

      Filesize

      24KB

      MD5

      93cb0adb901680dd14269ab60f8e59c1

      SHA1

      36d8f6831c115cc28c096947ab078da884a71b8b

      SHA256

      12df3126aee7ef26b97e1e8cf0b98f0a3c7450d86214a3c55752444ead3425e1

      SHA512

      1b2cc2c348ea28b998e3ed6f41efe95a3cfbf8ce22d8132cc1a0aafdf08fb2890efad278655770f9eb8cc3e69377d34db9de6733f21e00da2b4c4236fe702453

    • C:\Users\Admin\AppData\Local\Temp\exe26F2.tmp

      Filesize

      41KB

      MD5

      34dc2281ba5f8c4a7db8388be126278d

      SHA1

      1974c9398171a8151acc6602a5f0adea3c62ad98

      SHA256

      b40e0b0ed0a877a445c21852b0449a4a45fb1210babc9b5ff0c024f29cafa4b6

      SHA512

      5b0b0a694464d1d20786f726c32b571e757db323c0d9523c3028f4ec9702023501749b908c86dc19b3f8f0e1d514413868e148ceb39c6ce9544d70bc3ee5b8da

    • C:\Users\Admin\AppData\Local\Temp\u.dll

      Filesize

      382KB

      MD5

      3981395ac550547f964f87a3f15e2158

      SHA1

      7538d14a77bbb4cdfadff74385f849199392bf74

      SHA256

      8ef383ea0d049c6972c81e1ecdde8d719d5d0cdda995fa1ab70a3ee32c4acb73

      SHA512

      700649f2d7180ce60457de5537544254c40fba9b8871312cf0f25743fcce46714b21c3cc079e80afbc342edd743e33e91b4e28e412315bcdfc8436170e37f1f7

    • C:\Users\Admin\AppData\Local\Temp\u.dll

      Filesize

      3KB

      MD5

      7c2a7d515388a6462b78da46221739a5

      SHA1

      e5b22e93559a785624f2737b9ce56dd33456fbdd

      SHA256

      1a7b433313b2318cc9e0806bce779b74b64d74db45315cc2ba1105db9a1e5898

      SHA512

      2116e9729d13e80e8b8a43cedd38d059033f23cbc82c9c3634b3b8cafa034f9be849c22fcf11da65002a3f79d9466f0c2ef7b7e9e9ab62140a0151ef1e49e640

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      2KB

      MD5

      49e2ce938c602478562780db1903fad3

      SHA1

      f67a09e58cecc247364df747becdbf6bfac6a4f7

      SHA256

      f4a4346e0294e6a07f5f44b10b2333e35fa0323e49a260b5ec46520259eca2b8

      SHA512

      8b6de308999b94661fe37cc9fcb7476d5083cad479809205f68dbe515ed835900f99c4c7bc8375b835af0a7389ad1329c9dc4c354a11fed7f67ee98280f989d9

    • \Users\Admin\AppData\Local\Temp\u.dll

      Filesize

      700KB

      MD5

      53ee8e1c37a92d5aeb8659ecee2ac3a1

      SHA1

      71796b59fbdf11911e334bd75c4db768ccb2e20c

      SHA256

      bc1d49335ec67901098d7ad58da0d48b7900132807dc6eb28d4dbbc794bcc0c0

      SHA512

      24d8ab3d149396a85f08f98c64610e3b536ddd5abe4f83aa77597dd3c657cee3ee725f40d78c33b16eed0853654edf5803e83b9b61c99253f1d3d214cc122231

    • memory/2500-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2500-113-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2852-96-0x0000000000340000-0x0000000000374000-memory.dmp

      Filesize

      208KB

    • memory/2852-95-0x0000000000340000-0x0000000000374000-memory.dmp

      Filesize

      208KB

    • memory/2876-98-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2876-103-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB