Analysis

  • max time kernel
    143s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:20

General

  • Target

    7da10a26035af9b255ce6d21589777083e5999d794a858f86d936f41ff172124.exe

  • Size

    3.5MB

  • MD5

    93ad02887e486f489b1156c368d685e9

  • SHA1

    9ab1f0c6e202c39961e1230b4e0a4de4fac4a2ea

  • SHA256

    7da10a26035af9b255ce6d21589777083e5999d794a858f86d936f41ff172124

  • SHA512

    c73008b80de0797efc5adad177077bacbe8439bfcfef3c534fba109f31b7ef96e7190f7d35620c73da24dd7608694debc2af20f195f1cbfb15823e3e225882dd

  • SSDEEP

    49152:5AYiVCsdEB9Z0YRTlO5hAN71TyXC++E5R7b/IWuRRKA1lfHiF/ipwCfz4mCKa4ys:5AY9x9KYRJuo/zIrGblr37pC4yePDqQ

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7da10a26035af9b255ce6d21589777083e5999d794a858f86d936f41ff172124.exe
    "C:\Users\Admin\AppData\Local\Temp\7da10a26035af9b255ce6d21589777083e5999d794a858f86d936f41ff172124.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test55600768B40BE97D308C00417DAAA2BC; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestBFE9CC513B6256543B5D18DEF7F031D7; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2620
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestB7E567A09ACC84C71092810B2DBF0DDA; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2912
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test52974D14A66969D8C2290DD1BDD1648E; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2804
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test071DB92BC36EE7CED11AAA3F90994F27; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:2824
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo Test83F541D744C02580EAF59C3E4628CC60; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:1500
    • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe
      "C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe" -v -t -pw "Xooviet0" [email protected] while :; do echo TestE1D125A6926A5220BF5C915DC12F6E3A; sleep 53; done;
      2⤵
      • Executes dropped EXE
      PID:608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    b51fdb089fe47c835cf803d3bc8d4f26

    SHA1

    5e91d5bda6c92202188e3e358b6a377389099130

    SHA256

    e9d494f1ba0c9df742c83fd4213ee44b7222ded51b3ab695a553d9e4765746bd

    SHA512

    528c42f870364d758a15039f9580a3373d6d5f771a522f0dce259bd62c4a99e110ceb03a5fe76665ec9f0ea30e173ad7640083a8a695a57eff4cc6d106f2c57d

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    f07848a88b0bfefce6bfa3b6000e6ad0

    SHA1

    aa4b0a1cfa2204bee7e3ad94d4f20961a31cf2ac

    SHA256

    aff11ca74dc986b337d2b0ac5f4e6d9ed27dcd19a3585947c0ae02b2bb2fdc7a

    SHA512

    b58e405d1848ab3f8677e5a6416919b9c5e175a4636cb8507f4807248bad5a155f41207be78f359dbf039c0664d9d0d2265596b52afda450d8135c48ced3fe94

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    e1c33837bc904158a9bad2cae1f669b4

    SHA1

    5a95710ebd7bad7ee62caf07c621b53d953e259c

    SHA256

    2865796dd15ed7d8aaf9eaff3a9ee4ef498fa7127cd8cdbb98b65933a875969b

    SHA512

    faba80845113acc29b223875e26c741678784de6535713061c2233d77bfe4179921aa88c9dce4187bf39cf6b34737e6a47c63166478a0c6d2bc76ab4293a5b05

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    fce923787c78a5ad43a628c337ae1df1

    SHA1

    58d7de5069bc1a2ee3b344918d308945cbaa8b2b

    SHA256

    ced8de703885f132ff67651c416e5d13f95751482967c3d43c646b6378f63ab9

    SHA512

    2712361fbb4bfc46b3ed1cfb9239ba7fb6f6a7ff7802a4f6b91f191944cdf9ef1affdb618cba97d9aabc1b058c9dd06399ff3955897c19dad0f1810889eb0562

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    ea464b70297ff588a5191e029c7c51ae

    SHA1

    9934f09b725505347a81ca11791505653536118c

    SHA256

    b55ec27ceacf5d8942e8fc9514bc07cca55411e2cec62373e02eb3dcffe91461

    SHA512

    454878941522f05ab28670b3f7c7069205af608e26c7455d8e289c9274d5835b0a9a913442f862f94e249caf8bef6dd1e2fc986b65918f71a7708d11e62efd82

  • C:\Users\Admin\AppData\Local\PUTTY.RND

    Filesize

    600B

    MD5

    4e662f893e7c0ee6e774acea9871396a

    SHA1

    1d3d461128fadec5142bb7df63c9d70cf9f50149

    SHA256

    99264cef3a413c6909eb3f7be1b4eaa307915b11cd0703b962c57ec8dc668454

    SHA512

    aaa740cef894cc27c19ef1a586239f8588f6f1d3d8515c868b704755160fc018dba8f6c7f9947882c65d1f324e6e9d2e5a57676a44f8c58337bcbfb05d8f86f3

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    76KB

    MD5

    a04e607b1a23cbd256d94fb74c53175a

    SHA1

    5397ada115c2dac84b0bf0409c5050c398858180

    SHA256

    f6598cdd481cb4c99deb1fad4e42a64a3a37a7a99ccbb956f5eac10dd3f9080f

    SHA512

    d9b0f49b28d948df4038eb6d4774ed90992c7139959828be00f824dc24247b17a620d484f7302e49b2689224346770fac414979a055eb131a6d7d4393cfe64d0

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    9KB

    MD5

    004ef6b93f258591a0b95103904b65a9

    SHA1

    effe6b52e7bcc0b496697f9dd164dee989df8a6c

    SHA256

    395a8ac50c6ac6a3253b5b778e2d88d0451ddcf94770333e3ae422cfcb583c94

    SHA512

    c20157d4e3cfed1e24c6e810a725311262a0b21a9d4ce40d1e4ce8c859195080d150b233c22234fb5547e0256dfc6120cb084b0b4f7518da68bea56d66588ed0

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    110KB

    MD5

    7535411b224aba85b60f2555c884432d

    SHA1

    e88c2558ead0db17ecf746e0ec6942853e410ed7

    SHA256

    237d62e877afcada670c4eea5fbdefed3d43c161926122cefe547b7292bb3b40

    SHA512

    edd595342ec5ce6300a9d17eb807eca84eaf9e2b9b12a8d54df9d4e19b5a60ded73e9cf9281f549c80959d2071e1d4144093a83c4b321dd3229a5386c8a0b53b

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    27KB

    MD5

    c4f7440d696c6f5dde47fa73623627da

    SHA1

    892540afd92d0d607af63fb053dace082e2df987

    SHA256

    6e633043d0dc849fcafcaae2940eed5cc7de7db2170ac6732b801a5d3060d679

    SHA512

    958246aa969b735dc7ba00ffd0666aa0802561562d16b9c398885203612197947a21f8320e6259059a840a1657c0db921f896fd1c856c7a6e912f42ff3ed3611

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    55KB

    MD5

    6f0fec69c0e17756a7cd7951db653acb

    SHA1

    a36a6586325e15d86cf105b81b5a45fbb9bb04e2

    SHA256

    1a0205458d59b971a2643dd06170696846fb60bc85832d6ddb4d970f2cc8dc2b

    SHA512

    aeca700378b6780d527ecf125c296785c82448a657d3b8d4805bffb18c89499bcaab9140431dcd6ba4ae3388a285a7924b908e7e0b4441343f7a341c30a602e8

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    53KB

    MD5

    4e1b27acba6355c7f75bc36b0febb2e3

    SHA1

    71235a53228c7ee423ab65e4d9108d3b543f088d

    SHA256

    924d9d452b9b70a589244dbcec22b1a9e1390c5f07260a708b208673a69f650d

    SHA512

    aaaedc0ff7e1b93f7ab43bca423f6d4c96caae29441e2edb7df83a23ec0c7badfa96d9419b6b7b0ca3c0cf144c3a28c130eeccd84bb9bc3445e21d38a1b42e03

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    30KB

    MD5

    0aac7fdb134bde5d27c004f2606d2562

    SHA1

    09a883cef6ad67e3514dcb0e9ec494738f6f5564

    SHA256

    ca1b0659515bdbccb949db12b69b30888fb447a0e0a622e4ab9312a71b24e275

    SHA512

    d5e68f395df1b191d7dee36c3d4a1ac3e836b344c8121a945e2ef4f4d41d879a5c256640b056417d588b69ad7127861a607895e441613b77ad4264f9522ca199

  • C:\Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    30KB

    MD5

    5c739847e0aec5c9fa868789428ca202

    SHA1

    edacf8800e9d3a689066eec745be36460f25051a

    SHA256

    0f2d242aba96a887d30da3b6efa2b656ae663de97035f99a454374fac8d1737f

    SHA512

    8e3c3fc58e3b7a4a132810d1b2e168641e901c2e71030183d0d4b7fcae1fc7b29aecdbdeb9de5eb88ea6270e4641d1bfe3a70aab89ef1400ea64d258ed894ad0

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    61KB

    MD5

    77599651510aacf2dbe112886f61570c

    SHA1

    d27c6adb177705987336ec79ca896476af15eea6

    SHA256

    5c024130371c0009dc326b2c1a83491841c29d4324ffc5ef1fbdea71b06611c1

    SHA512

    7055b085a97c8f89fee3b8a60cbdb99afc77e307c8250b9537be5a4c142d504dce30207a6a3095f1f35208187828f762bddec9676af9e4478bffab6fd83835fc

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    81KB

    MD5

    73bb58379f08a2cede935ad403de9153

    SHA1

    0953fe6327124883de0b0bcaecd98299d4153dc5

    SHA256

    32a045ef1fda801b6e941f5c2aa84e689a3c8ae52d674629a7e20bb420d601f8

    SHA512

    914dafa2c9d007d37eb7636abfa318ec6d2d12a67f5123aeebe1e131bb86e57c1d23eba569d65e4fcc341ede99605cc363d30334ab5f8f41e5d3924eba3c465d

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    142KB

    MD5

    457fa045ca15d9146c6cbc4e32ffd3b4

    SHA1

    6b248aa3f5d7759e015c79d5054a7c371ddd6c5a

    SHA256

    386beb12fbb270a44e28204c76e74710039680ed8dc4f36742b37e2cb950dfbf

    SHA512

    8cfe7114fff1d6ba9d37d4d5d1a66f9d0078cb1dec818eaed1ca63d8a96ebde189e867e3dd6abbb4f3522ba27edbdcfacc185ff1974caf2ca1bc9740e81dd5aa

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    46KB

    MD5

    1c49f69372a1bc212c09418380bc81e1

    SHA1

    869c1d5ec9b5f07cb6214ccae88d61ec11483b4f

    SHA256

    f64d90c9c7533dc3f81b5167bd097cfafd44564b44fca9d4f71f28f6826c8a47

    SHA512

    d2ff0eab53d3ac29ce8bd94ecde3f55b586688683b6e796e3897a61f62121555fbb5f55b6948f90db7b1690f5270705a2a9f09d6852e55200f3d08e4d09dfef5

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    49KB

    MD5

    10376576c7b61c68c1c64534f25b3dbd

    SHA1

    e6514343dbc0074cbaea6b79c5f3125fd5d4c551

    SHA256

    8b428e8018b5e4f768c0fe8c38083fb6c67e69994b3a156326ae5e59c333ab82

    SHA512

    6fa3501ba17a28ee8615dfcb11a5004ed4d5e06ff6b9fa460ba59071e185c90655e7945745c6248b912bb808d9b2449326f61b21b43531b95025efcd53183cd2

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    93KB

    MD5

    b869499110b7e9b626551e549d52b867

    SHA1

    17cb86a72467ee9f5f8afdc56df45c34daabd9bf

    SHA256

    06547f2aa29969df3c26a262786d03235035970414723c1a7cf16892e80ffae3

    SHA512

    b66c13852d2432fd4cef60ffaccf2b93a98c56290ff3f2015b96f22bc1a5fcacbae1c5bac7a844f2eb26cf6312227d01f020c05cb0a92da3f7c10a5650e1c240

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    3KB

    MD5

    09fcb3df98b4322d76f64fbe22850484

    SHA1

    03eb17e2f4ec0f4b2228a453b854e37f1fb96f3c

    SHA256

    fdfe775afe5a4c5c624fc2f3a169a88c5d53c079dff43ddd85d6bcdf76c30940

    SHA512

    f9e9b4ec80807222cde4091deb929968625ff2d19254c4b3707404767b5faf2bda2c7211437dcf3e1cff62e84d15dbdc7dc830f3f78c95782e90c8d787632e31

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    21KB

    MD5

    9133634fe5dd2ebc4772c9dc3669d879

    SHA1

    fe9ca17addb3e48d663e436a382475eba09f1ec4

    SHA256

    e897d4a9d0a59cc5cbf86946491798afb2acc91eb80d8ef0a594f4c7c5a38dc4

    SHA512

    a73da04a466202a0234dc84ef01a6f508980526b0ed8c1bb15a217acb6de2a7ad5ea72c1e01763bf674ebad0a9be303ba774ba2db530043159d0f159cb04d8d6

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    53KB

    MD5

    5bfe8eaa212743edb9e44fcd56a1ddee

    SHA1

    68660d4f06bab7a82c4acc14bfc2771a75571b8a

    SHA256

    8ed1be338ee07bdc91a0a4224c1ffd930ee0974bceb525d18867ee978817b31a

    SHA512

    821c6fd728b00ca7317dfdd1f47ebf3c9fa742f008058ab9400bc768ac575ef0a56298c9a064ebe48c8d29b3d05be376dcd91adbfa4c1d307bbc6cd53119b7c6

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    97KB

    MD5

    f17115c10253bfd2576112917d73734f

    SHA1

    4b08db3d4840c55ce64a688197595f74588b8265

    SHA256

    f486a77919d4d9c22f5ab7c21067f83d9d32a83650398fd14ccf4e0bf8de4bc0

    SHA512

    58fd04f31b5a73857efef6aa0ac70d4692854ce4ba20cf0f5a9b33d8ea2866adf9edaf41bf964fceadaa7d1fbb88c69e12aafaa7a539506f599a6eca78f8746c

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    16KB

    MD5

    e2a0003c1f1bfff64d6a44d00b63195c

    SHA1

    05018f7018e7f607a2d655e298b1508059f6d804

    SHA256

    fe05a21122fafba591edb42b1a11f44e90c176bccca48e7980913cf07fd97616

    SHA512

    102e47dad0d942c4851277342a63d63b0f39cbadc770d60bd174982e6bf170c302bf70cb8b14559af7defa738938bcd2d56d6b486f5a7e3c527593278d81b601

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    47KB

    MD5

    819d109c3e81528a91a4ffdb62a5c0fe

    SHA1

    198a36993e5f2e765ab8e37181a0861c5e58c8d2

    SHA256

    9acb8012abff7f9d564306ab620b4698dca29ef48650ef34604a266309390b3b

    SHA512

    32e9b9f45e8c72c12ea65163346b17bef10d734f5c2fe852487a4f60cce05fed9d0adf65525ad4a46a3e4bb2ee0782b388a2ef2bd6ac3d52669798701a507afc

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    64KB

    MD5

    11937240f4818149e86d21b261f29dd3

    SHA1

    3faf12b3d31d341aec743a892a0d1c240e51e92e

    SHA256

    f4f9642825734703fc4eec966d595c68fc3e96b62ea96f9774b013e74da3e60b

    SHA512

    0dc3a6c5f46e26d69c999baff705c304eece12313acb87e3e308f9941f02314315c3b215b97e6bc4a40b5ec538e4098e3660317fb53f01bc58237a93ad5f364c

  • \Users\Admin\AppData\Local\Temp\MartemGWS\plink.exe

    Filesize

    5KB

    MD5

    edc3f6286e836a76e449035259ed7754

    SHA1

    4360390782089d399b2759adfc08ed342f0b8dc8

    SHA256

    e7eea2a1d990711cb2057653ad87505f219cddbfc39778f0b0151fd4d473eebe

    SHA512

    46677705d9c7da280f1e4fe353c092fa7c75bc2366b9dbaf27b3d13844302b45d6aa4eaeb07bdb0859a67c8531a78037ba9cc41dd860708fcaf240a900cb196d

  • memory/2960-1-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2960-37-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-15-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-27-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-38-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-59-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-70-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-49-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-48-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-14-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-13-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-71-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-25-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/2960-26-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-60-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-0-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-81-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB

  • memory/2960-82-0x0000000000800000-0x0000000001711000-memory.dmp

    Filesize

    15.1MB