Analysis

  • max time kernel
    146s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:30

General

  • Target

    mphotelsetup.exe

  • Size

    10.6MB

  • MD5

    e742ffab01d07b009c1b3f7ce1cb7133

  • SHA1

    509a3f415df48c00439d092214b4a26166fbde07

  • SHA256

    b1826ca81e016f949afa2a105ac75e3af5212d9da6e01e986f47014c19af0697

  • SHA512

    5cc15095984b00b06a4007155eb4814bee3e496b20e4c48ea7049bbf890da7b1ce1bd42a84c84d4b6d48025599997108270b0d6bc10f182a486e4f6de13300f6

  • SSDEEP

    196608:/HplajtD8FaGv21yUZ6HOFy3g3h7wDbd8ghMKGv0Zo+Vz4V:xlaxzGO1xISo9h3jzi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mphotelsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\mphotelsetup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Users\Admin\AppData\Local\Temp\mptips.exe
      C:\Users\Admin\AppData\Local\Temp\mptips.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2684

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\mptips.exe

    Filesize

    307KB

    MD5

    9a41e2e484addd7b4424a1ddaf2f1bcd

    SHA1

    89710a45f46039d507c7d90dc4ed92cc6ebc134b

    SHA256

    a2b1ea2cbb766668f45bac6a64844b1455c5d59be7c5af0eac124006d8ff68a4

    SHA512

    6c2c398cb9d5d06256fe19379e8da0dd1dc42ac87f48fa86a2ab3240558c2af94485d8c741e9b5fea0ba5d61dade5a496cf632c4e6ce54be359fdaa087a0ed00

  • \Users\Admin\AppData\Local\Temp\nst8B8F.tmp\advsplash.dll

    Filesize

    5KB

    MD5

    ca60ae514320a0bfc4991c1fca3dc4ce

    SHA1

    c0d7db92c979d75233db185f18dee0c9518dd8ae

    SHA256

    08d2283396141ae8222c6959a0e1b4f75a75a3f2643b33d6d1c9b90d0669c606

    SHA512

    8e2d00909828b2f527bed1d2dae39e991142091cda8e80fb512ef2790fdd8146e6222dc1a98730af864b1437eab9f0e881e9adc3aad4e6c67f840dc3c4115a3b

  • memory/2684-20-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB