Analysis

  • max time kernel
    120s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:44

General

  • Target

    0d5cc91890c411599e994ab4d927350b.exe

  • Size

    739KB

  • MD5

    0d5cc91890c411599e994ab4d927350b

  • SHA1

    b64c4752537fc05bd460918fe252ef64e72d2651

  • SHA256

    b64cc3011b334fe3fdc47852da28f1d865a1f71dd819827a035b9b3adab1a163

  • SHA512

    56418a6586f0cc7f985e944811744fdce2ddaea5e238d02b21435768a3738ba7cccc738190b677f0eb66916a24cdcd4b63701df8a35c7a44802ba053ccdf059b

  • SSDEEP

    6144:d/QiQXC45m+ksmpk3U9j0IeP2soxvjFEOTb9WmZX/8shzdsY4CpHPhnq/FK:VQi34c6m6UR0IeP2p1hf39Wkv8xwJqdK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp" /SL5="$30158,506127,422400,C:\Users\Admin\AppData\Local\Temp\0d5cc91890c411599e994ab4d927350b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2236

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp

          Filesize

          3KB

          MD5

          91f199fa75234b4873a79f8a2e4a21ad

          SHA1

          7e323707b245fab333211fc0b9f95a5ae9c5ca09

          SHA256

          c13eadcc5c97cfb4a82978f64a8ef0d9a34dfd50930617b02fd97636782e66ba

          SHA512

          f24ab9d75a0f62bbf63cae3e75734f973fa5f6b8d3828ca2a9a22caea57e54c1f2cc3e434eb7904499932b6fc4c5972a3ab6cad36d0b1267f78ed124c614a5e9

        • \Users\Admin\AppData\Local\Temp\is-33FQ4.tmp\_isetup\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • \Users\Admin\AppData\Local\Temp\is-33FQ4.tmp\idp.dll

          Filesize

          120KB

          MD5

          adf7b237376b01f0ffe2fe6303b16e9e

          SHA1

          f690c2776a42a5fa0a1e07c815588d3cfde6092b

          SHA256

          331b412b3cda48968903d0bad223e7c8c0d5ed71364ad08d35a249e3e7808d52

          SHA512

          bcab8c618d46ed7aec5c880b206be38ce0d514da7cea1c92a7ceec0a1e1990051b2732c9ada4cb95d4443c9a960e019ec3dd2e412902aa10ec6e4c2367cef615

        • \Users\Admin\AppData\Local\Temp\is-C70KB.tmp\0d5cc91890c411599e994ab4d927350b.tmp

          Filesize

          19KB

          MD5

          38df3061b6a9601137760cd3a38de9c5

          SHA1

          287dc3a02f0994f31e024de81cd986e5354ba5de

          SHA256

          05c5c4865fd9bd1ef981723c12bd44c242c355853b03c5d1d0720f166a0fad7a

          SHA512

          6029216386fef553deffc77e63469189ec1efe69dd886253ab2c5294bceeddaa4c8d8c7b48a5f676ddb86e87327bc1aa24ca551d7d62ae1f1abea35d57496319

        • memory/1868-0-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1868-2-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1868-24-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/2236-8-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB

        • memory/2236-22-0x0000000000400000-0x0000000000516000-memory.dmp

          Filesize

          1.1MB