Analysis

  • max time kernel
    152s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:35

General

  • Target

    01eadccad7ee4f1a603eb35b69d31e1f.exe

  • Size

    273KB

  • MD5

    01eadccad7ee4f1a603eb35b69d31e1f

  • SHA1

    68f7e6d4e4cd4f47939077ca428fc6e66bfc5c0f

  • SHA256

    eea3d86e704ce4c4274ddd4bee06ae59b93ff6e49d1b4ce81355d52c1f6a886c

  • SHA512

    0ac2e0a5a516d5360e16faf6170ba7c17d8d519b340d0fa36fe9708937f81a6c9e02f582e3848b638a30028ee5ca5ec31b5a21d8b4cc18b9ee7486c13d6565d3

  • SSDEEP

    6144:y931FlqrNz04oZ8IgrV61iLo7qD9ML+yvioC7HT/0W8:QlqpzoZ7grc1ko79L+iioazS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01eadccad7ee4f1a603eb35b69d31e1f.exe
    "C:\Users\Admin\AppData\Local\Temp\01eadccad7ee4f1a603eb35b69d31e1f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\01eadccad7ee4f1a603eb35b69d31e1f.exe
      "C:\Users\Admin\AppData\Local\Temp\01eadccad7ee4f1a603eb35b69d31e1f.exe" --cp "C:\Users\Admin\AppData\Local\Temp\C9A6.tmp"
      2⤵
        PID:2712
      • C:\Users\Admin\AppData\Local\Temp\C967.tmp
        C:\Users\Admin\AppData\Local\Temp\C967.tmp
        2⤵
        • Executes dropped EXE
        PID:2732

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\C967.tmp

      Filesize

      95KB

      MD5

      d1105b8020f4ca9a565d7a26012652b0

      SHA1

      0327a183f2e70548d6e863b1b9d681114ae6e326

      SHA256

      a97cb8b03a3d6d0dfcc51f03c597dae222d050cc21bf4fa22c053516c342442e

      SHA512

      23d56be72be3265a2b48b6116fd677663d4a6af774de88a87c30a982889b720b915cbbe5f8e90e3e946056f006b6fa0fe5e4e2c7d462b35b6817b64cddc415ec

    • C:\Users\Admin\AppData\Local\Temp\C967.tmp

      Filesize

      90KB

      MD5

      5e0c9b5830bc996596cde3b3bc26f6cb

      SHA1

      037224bedcecadd7eeb2ba32604f4a008b0069e8

      SHA256

      8ccb3ca4e8cde31e9f5c37226505f06594ddf37e0b2d8067466a6d8836ac05e5

      SHA512

      b167142f1b1bf04c4ec6936bd119ad3a4da63761cd12ff8855a07541eb0a525dfed196ab65b520459bda4819f09bb3865ec25c8fd6d7dbc5d992238885f20793

    • C:\Users\Admin\AppData\Local\Temp\C9A6.tmp

      Filesize

      95KB

      MD5

      5a10127d0628a745fae1543bd0f8a79c

      SHA1

      72d0c28da958e16d82856af9a23e2bd94b18a70f

      SHA256

      3651cfe73c6f00b04423e5cad8884bc3962de7c65421616c3940e7c46d794f85

      SHA512

      9dff70795a2806866ff775939b9b1ec24c1935386fede098f7de8d8d7935648856555adeaa26177b30d718ccf82c795db367e18ec09bf364e372cdf6b79cffbe

    • \Users\Admin\AppData\Local\Temp\C967.tmp

      Filesize

      1KB

      MD5

      dc56221f50cd0b2b04644e3a0d98234d

      SHA1

      88f9d89a34696e53553687af166c00ab5a51a3fc

      SHA256

      aeee7500a6fafcb092b0c0f0d9455b10146803919fe62740efec221b17eba22e

      SHA512

      609fc7a3f4b5398e47998122e320eda5ccca56be3392631a11e198c33a764b6ab32db264650724dd9790acb2e8e5e7bcdb3bc3128585bb90f436249fad6b698f

    • \Users\Admin\AppData\Local\Temp\C967.tmp

      Filesize

      22KB

      MD5

      2477d4928874540309bafccac14a66f4

      SHA1

      1a327ded81d5ede0acf025eca9b0a91befc40ec9

      SHA256

      32bc7f9a9f0937f4fb95b55bbfd2205d0f225e61323b49ae9c66049e25594a16

      SHA512

      1b29f15dec40380f04b01cdfc096529abbc4975ec3e60ea844a1bcbacaf9a9fcee6ba208738a10d604f514a88d9ee505c503464fadfbe28c87627a8894644a67

    • \Users\Admin\AppData\Local\Temp\C9A6.tmp

      Filesize

      70KB

      MD5

      b4322c3b2cf62dcfa973006fb761ef3b

      SHA1

      55d0f964ccf1cca293665b26258d3d21829a9d47

      SHA256

      4df52f2485b13f7ac22fca494d4c1201e97aea5b7a7e30b147693322490a1ac6

      SHA512

      c11961f46073b3260bd01c5a704aa36172f0a032abe56dfb3921c13aee4d80dddc831b5848a8f403000f553dc9cbafaf2d5410b1b36f0cfff6184a58af038898

    • memory/2268-20-0x0000000000220000-0x000000000026B000-memory.dmp

      Filesize

      300KB

    • memory/2268-0-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/2268-1-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/2268-27-0x0000000000220000-0x000000000026B000-memory.dmp

      Filesize

      300KB

    • memory/2268-29-0x0000000000220000-0x000000000026B000-memory.dmp

      Filesize

      300KB

    • memory/2268-28-0x0000000000220000-0x000000000026B000-memory.dmp

      Filesize

      300KB

    • memory/2712-17-0x0000000000220000-0x0000000000320000-memory.dmp

      Filesize

      1024KB

    • memory/2712-14-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/2732-24-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/2732-23-0x0000000000400000-0x000000000043D110-memory.dmp

      Filesize

      244KB