Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:18

General

  • Target

    6e1806c27f6cf547af6aef078b2bbfdd9343a495bf3f5da4e92368ee86c004ac.exe

  • Size

    3.5MB

  • MD5

    3294588e1d808f8a6d15d347fb127621

  • SHA1

    58e557ad5b1fadfda05f0f6893443a4e5acf1970

  • SHA256

    6e1806c27f6cf547af6aef078b2bbfdd9343a495bf3f5da4e92368ee86c004ac

  • SHA512

    edf0d93ca1376d53f10df5599d5b530a3505d5ef1dc62af15ee6c23bf92d453ad8fe20e8fd7c11823e0a6e43d305ad6c32a11308fbc7e9ac09cacb37a0740b13

  • SSDEEP

    98304:HrO4Ot1R2nUZh+pMh1RzRAaETtMlj+G+tD:QtL2nKh+qiScG+t

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e1806c27f6cf547af6aef078b2bbfdd9343a495bf3f5da4e92368ee86c004ac.exe
    "C:\Users\Admin\AppData\Local\Temp\6e1806c27f6cf547af6aef078b2bbfdd9343a495bf3f5da4e92368ee86c004ac.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test5E52B028D3322DD49D069FEC6503D6DE; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test5E34F251F1C0FA886D70943505C7A994; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2932
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestD72D1C4BA67E269D9693B0609F259845; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2268
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestAD03E0DBCEC1458F8D898035537EB4F8; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:372
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test9FDC15D5868CD0D0817494B3F6A17477; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2184
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test4146466404271D3E36CB912F49903332; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2764
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestD6467D737EDFBB487BF6BC02C1F356C3; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:992

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          6975ff39d96ef5c45539aa83553b0ae2

          SHA1

          76de14c2439c0371ee475b7c8108a4ad7fc108ef

          SHA256

          53dd39bc13cbcda2fcade49260482ab121afd827426d5f7a40bcf72c7dc69ed7

          SHA512

          badddc247ff2638570a7fd957a631fb80a108a1616920538475051aa82d451cee7f719ce3b09fdfe626354aa2e571bde0c5c5cbcaa3321a05481d48eaf1ab749

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          4196cc51e6a2d17ddf95164e7cd55de6

          SHA1

          e47fb7b6e2fdc2cba87ecc01b7c16e43c378dcfb

          SHA256

          67052df6cbf54fe5948a361c7581e237bc08d871b6346f8ae248b3ebe64848c7

          SHA512

          08dbe123b9a2552bbe9a7d95af4023d9144ba80b7660b3806d349a78344e0a0dca1d77170eebac87614565f3f8013c6cad72f88b9fc20b3defa26a47850682d1

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          a56e305fa46412ef92da47d49c3765a2

          SHA1

          bc098216c5670cde5262cf46f32633ace3032eff

          SHA256

          10aa85ee0d62cb4d227a06c8517b9714d88c1de5679fe04bdef75729a8f09bac

          SHA512

          1a6216a3cc3d92d6c5a3f8d7a6d60af9ae7c3a7b9fe6210a3c8d5f3a9fa510a6cf3a1fb8301769281791437fffca8a9c430c779f31e0a823e79b98aa81958181

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          e1e5ee49ea5c5634962a40d242a1d60c

          SHA1

          330ef9a2d807f77ff5a5a6c2495be459e6769f42

          SHA256

          ad58319419abe6829c9fb724adf0aee9c6c3bab2120959d618617a74562eddde

          SHA512

          eaad1151d07eefc7e3750c940b7699337b7ae57a237e6daddfef2b2919321291a1f12f0b7ed4cabaf6d6d34223761ae78ca204e0a1f5ff8b75c92ea140619c56

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          6abbc25a8b5fdce074c73add1943b698

          SHA1

          2c9937dc25a6cbb59affef466b49d23976f0ad2d

          SHA256

          c91fde5a583f46f992117eb31de3c1443d227b2a378b55a00d60ba4e822f5730

          SHA512

          2c81bebc0e6b251b09b7c8db4aa4dc633f30c1d9d669575823c25f008dd6f19a88c85d7ec340ef72c3d500c783eb223189e830ea82d1d837592720e7cfb56625

        • C:\Users\Admin\AppData\Local\PUTTY.RND

          Filesize

          600B

          MD5

          c55da2682ae7c95fa6c67faab61bfd6e

          SHA1

          7fab53008a965980fc647626b6af7081aa639d03

          SHA256

          e6ae03a3357ef5da3bec2e4c330c2b0acd6a672b5b94fdf4f843f5ac84f66802

          SHA512

          f416ab6eb90038b8a866a210fd42ba053fad013d8c71ad812055332182b3485f238d5f35d69886566e2442d153409612f1bf9ec2b74b3f177e12209aaba6c97b

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          24KB

          MD5

          f185a749ff81fae47eb96ad322495833

          SHA1

          ed2944ed85d9572a4c0bd5a03abb80b0bc534016

          SHA256

          81813bc5b1b1dfa93f31c04ca9cb1d6365ff40e48eb4875ea634f26400a37231

          SHA512

          a9390c7e2c27ba61ff8fabe7b806ec79792043d31a54dfbbadf329ba0a3667ac94382edb4592375fe565657246246a68dd02f5c82a1c6d3e4118fb28198ef645

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          99KB

          MD5

          4b6a51dc997a456d8502981183b5f378

          SHA1

          cd7b90ee5359cd1284c89ccee5dd813465307e8b

          SHA256

          d8a1476fe86998c63dbe1cefc7ae15520c7cfd2a09000f96a721bd60e0146ef0

          SHA512

          546e30e2051324d376729fc59f791e000b24fa593a8c61083f9bb527d054fbde895192fa0cdc388dbb7810b59e779a7a0b0eea668952103139c7625a55c8b1e8

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          38KB

          MD5

          ad3a89bef3f52ba18678c150d33f8b94

          SHA1

          68315c341a5b9cc87321cef27b1ed1608c606861

          SHA256

          23715d8c9a539cfa8d2eb87c7e9a4656096929395f7c3809482260786388d3be

          SHA512

          7fb3fec9015e182010bf9b7a8926b387ff7961fac2fec5e33ac452087f0959c961396d86920529cdb3ad327192f625074078384c8f2e666fa0ef94001f99c010

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          47KB

          MD5

          4f173c7e7778ab187908db372a55fa14

          SHA1

          b293c89abe9a0b0f38e364e7ec54bb623642bdb1

          SHA256

          c559adf49231d80b16cd085d1a3a61383af3ad4d915d432af4a3be17ea3b1fce

          SHA512

          10d4f8fc7c1e892ee998aca926dbce6d938201dcea60977d7e97139e68584e40951170da740e9243372f1ffc6622b98130d6275b08948342ed12db8f1ba952bf

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          173KB

          MD5

          2e58c10b55f6a76458b31a096e9d27f7

          SHA1

          4f11cac9f237c96ad850dca911fa9ebf595f5380

          SHA256

          01bf9e106a69d9d1393c7a671d2ee7d300a695f1f88687302b8c88f1de8874b3

          SHA512

          057b7b7e2852047e44f90c4be6189efef1ae94f93bca11a5a5529a613430f0bd9a53f3d6e86c2528fb7156f87ebf56491cb5ebefd5b33ca84e18ddc49ffc2540

        • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          15KB

          MD5

          b98d91475bba3f3fedd0ec3034e04ee9

          SHA1

          7de853b98b04a3b31c6bb0758debd90db99269e7

          SHA256

          0bede056aac309b23f48a92b37f595fc628af9a3c305b484b81d69657934b630

          SHA512

          856cd51124d260172003a101a1921cbff981d1bda80f965bad29366c60a4b0bbdd03ab53fa39f6ddbe9e414a73f5def18175d0e53b3b1b1632a592ac27c222d3

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          57KB

          MD5

          1c41baf08f5966d7b8978c8d2283bddc

          SHA1

          d6ba42a990bf985aec7c25254442f337dca3f568

          SHA256

          d927cb0677f697029428526f4db0d016887816eb2589bbfa5384422b102cbbe5

          SHA512

          4bbf8133ba91dfb1ae9b844968289c0b13ee7a9da928d041e4e0e1f77d4bf21b3f332bd5a8ecb4b37f09c20cb9c6f5061921766d462f99eea169e80b7ac1e599

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          92KB

          MD5

          f90b5b10c7ca79e616ccc372e3383f4a

          SHA1

          1627b8508fa60dc032ee3ec4b8de83b5d4f2c20b

          SHA256

          d3f4b8b2dbf7301624c82558163536c00f8488146b21186a86ba4908d12c3b8b

          SHA512

          da815683706ea58720e6143b1ba65d0b7b4ff869f4305562eb724965f5db11653cdd3f99ef834c2fa82622d0c7b105d7073338e1b4a158837b564d2d31bff90f

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          55KB

          MD5

          797b32667025e2acf8ac39779e2a06ae

          SHA1

          d78d70ea84263b630fe9041b31dca0ac7d0f149c

          SHA256

          35bd5e0769c61ead1a810f21c737a7f5b12aa10e32575210fbe8b8c822749522

          SHA512

          42ef606d53ca566bc5e78f864ddb3ae4813a0f085043cc048e49203b7de366b4fac2417c2ec49247faff34728aa5316cb4006e1cbd8ff5d0c92da375511582b6

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          18KB

          MD5

          3772d89ee2f9d75c458d498448015ff6

          SHA1

          a327602fe4303a4954efb88c8df5463c9c65d817

          SHA256

          5dcc472d19f560d4b1dd6a114bbb55e96b623b64639fee1cdbd84f6d7e1828ae

          SHA512

          36709d776d8721f2b8e70306b3484eba44502214792e6b1cb3fedfb723567af70b5cc65e659aa8eff5f19b1868053a9a6f1166b344cc3a6bdd1e643a0105b1c5

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          1KB

          MD5

          cae20a27294d1e0a799b2bed7f2a35bf

          SHA1

          0c2fd2662d350665a8b736b5ffee215e0bc88c3d

          SHA256

          63a225225c6fd6cae47ffcea79621ffd8ce1744f2dd77ab24e829fb74b3efc75

          SHA512

          60e9e88a11ee04fa2009907324a545b7038814c49b77cbb0c11660892d844a7be5c15ff82c2fed28b9d9294d4c67a5710157571caefe89b7532e4ee6c227ae07

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          21KB

          MD5

          cbb921267fd100099246bd056dd93e38

          SHA1

          5c2f620d623b8bbbccce8d304a3db99abaa166ad

          SHA256

          21f0741d8bd566b9f4f50fc2038ce544960a64d05aee74ef222bd84137a27005

          SHA512

          c2e521841fb0b1092feccd057c50e99f2210df6a3605ac9ab57a5a73b96d414bb266c428415ab57a813810ba12878574dbbc1b6240018d80820f67c658825fd0

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          92KB

          MD5

          021c3d8f2529724d06e6e742111e6f28

          SHA1

          e64fd4437d61467f481066cd611875f9e81d0e1c

          SHA256

          778380630e5759feab174a4caafb70bc4fe66d5432cb3ab6312f55882c18e831

          SHA512

          77742ba3f7fb4926c7db862471727db5b2ed01702928fb3d67981b31e5ae870fe836d877a2beb7abea00b3c1f51dd1e86572a7d8bbb824066ad027b6ea7325b6

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          73KB

          MD5

          dfb890bea1d8d0372a39914f0d7e5ada

          SHA1

          fad6a343273db3d443a750a77147beb93e9d90a0

          SHA256

          dbd318d1dbd864f9306d9742a662d68f1043af573149fa10f677403ae84b4c3e

          SHA512

          69f44c9f4dff832270fc1073570a00fd2406f7d39587d21a9167c0a896765fc5d8ac79d032acc1275b11af4bc2215f4dda304fd6fa4e6df6029a92bcf1df7053

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          168KB

          MD5

          9ce7a07433ad8f2c1ead2bf93800f59d

          SHA1

          1f694abeec51d0de3522a6b4a7c7fcb5ae8eef16

          SHA256

          1b42f82d3fd0011b04f781dbcf84edf9e4ed4fc622263bb03e907993f7c92543

          SHA512

          567f6738c321c9f05d1aac98f40306d80bb5d14c2c7871e432825cb5882713e07a8e9a8ee59e9177ff84bb37a0d63d44cb3b40f6727f0cc03db6038b6fb58609

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          124KB

          MD5

          7ea5ea1d03b7a3d6fbea31aa22b2b0d2

          SHA1

          2a5978c6f8d21de4433c8532b54880e8e6387103

          SHA256

          37219e8af9032c0585f10318c5f555b8bad1cec811e539b023e3b65d5eb412cd

          SHA512

          b51bef06558da8c54b3bd5649f464b9d3b48c2b8089df0a0997d1441ae44616a1c3541268014699a1d55fdb666eea7d7f05fd00aeca7cfa76173778f4ec3ffe1

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          87KB

          MD5

          c43b3c491b49e5cf2e7bb71c5dc6c35c

          SHA1

          567fcca2b239458cc72acf603ac01a898f249b13

          SHA256

          f460f0504a543a63a9847d1850c79938699954cde221b5cb1259cdfdd7d8ffcb

          SHA512

          3ae91c31fdaed3a1505b143bc55ccf8d986dfeafe5a2a7801858958caf54cc4da089c9340eb06b0eb3eaa8f94f79f974c1b5fbd263831ed6d8dd3c2b9aef66a5

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          108KB

          MD5

          4341db635a3db617b16299f0e2084a09

          SHA1

          020db1ceccd864e0bc0617ba98b4daa8f0086cec

          SHA256

          a7cbece5512a075c2c585a54938b74ea8d0cb6df425e136189e738439954dfef

          SHA512

          be0c48ed5af1cabfe8281f20c6972e2eda56d16694cadf6539a934ecd7f75f549af077e1904664b3d4034e5248450c6f0ee46be01d27c25bbbbb9db8ef035f88

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          64KB

          MD5

          11937240f4818149e86d21b261f29dd3

          SHA1

          3faf12b3d31d341aec743a892a0d1c240e51e92e

          SHA256

          f4f9642825734703fc4eec966d595c68fc3e96b62ea96f9774b013e74da3e60b

          SHA512

          0dc3a6c5f46e26d69c999baff705c304eece12313acb87e3e308f9941f02314315c3b215b97e6bc4a40b5ec538e4098e3660317fb53f01bc58237a93ad5f364c

        • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

          Filesize

          127KB

          MD5

          97bf5570611ed6780316431645b793d3

          SHA1

          93686277e1e5a83c829d52e621e3bf833a8953f1

          SHA256

          c49ba69a7c607342d6f77fc7dce83d377a212648c164b5bf62c076b932bfccc0

          SHA512

          71593965e0be4f5a6303db664529c4bd1693fbb7e7085d41c177be311e0ab28c7c7b1209f55fcbcfbaf4b0fd3fc95553472464daf7efb63b25012f8c67312c68

        • memory/2164-15-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-48-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-27-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-26-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-59-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-60-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-13-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-38-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-49-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-14-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-70-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-71-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-25-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2164-0-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-1-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2164-37-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-81-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB

        • memory/2164-82-0x0000000000800000-0x0000000001713000-memory.dmp

          Filesize

          15.1MB