Analysis

  • max time kernel
    152s
  • max time network
    192s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:39

General

  • Target

    24cb857e7a98eb2852a887f9a5d957ea.exe

  • Size

    68KB

  • MD5

    24cb857e7a98eb2852a887f9a5d957ea

  • SHA1

    116510bc7b499001f36082e194a07c22ec1bccff

  • SHA256

    3984c2b53442e692f4c12e8e79d7a9890730a1b4066607517403ac5cdae9d811

  • SHA512

    73828583015afe1a03631b289fec47ff559a5360202b017210562704fa8e76e0895261984ace3418c2854453625351845c8243a048b166423ed4c0f6b52678d9

  • SSDEEP

    1536:CVlRTWxTeJNaVKZ4M06wQJ7W1ReTiPh4kuZ:IlRTWxTeJNgKZ4a7EYq4VZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24cb857e7a98eb2852a887f9a5d957ea.exe
    "C:\Users\Admin\AppData\Local\Temp\24cb857e7a98eb2852a887f9a5d957ea.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\SysWOW64\cmd.exe
      /c del /f C:\Users\Admin\AppData\Local\Temp\24CB85~1.EXE.bak >> NUL
      2⤵
      • Deletes itself
      PID:1644
    • C:\ProgramData\mvoneriz\cnwryxaf.exe
      C:\ProgramData\mvoneriz\cnwryxaf.exe
      2⤵
      • Executes dropped EXE
      PID:1464

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\mvoneriz\cnwryxaf.exe

          Filesize

          65KB

          MD5

          78b5f48930c091259840864ff3dcca77

          SHA1

          3ef63f6760ca645da355cb36036d96c4787c4e42

          SHA256

          a31b6401f90e55363829e19f1128502063c502bde3ec160ba2452d143c8a30b6

          SHA512

          ead32119389ab8f3ee075bc890c889f01943ece8f1f95821324480a573e8aa6b46c71c28c8a2f5be91a9ed389edb1284f8f6dde1bcca46b3b3c0a62ecaa39b16

        • C:\ProgramData\mvoneriz\cnwryxaf.exe

          Filesize

          68KB

          MD5

          24cb857e7a98eb2852a887f9a5d957ea

          SHA1

          116510bc7b499001f36082e194a07c22ec1bccff

          SHA256

          3984c2b53442e692f4c12e8e79d7a9890730a1b4066607517403ac5cdae9d811

          SHA512

          73828583015afe1a03631b289fec47ff559a5360202b017210562704fa8e76e0895261984ace3418c2854453625351845c8243a048b166423ed4c0f6b52678d9

        • \ProgramData\mvoneriz\cnwryxaf.exe

          Filesize

          14KB

          MD5

          091eedb0888a626b0d76a519c8a16dbc

          SHA1

          7f07e246ef4fa04092ac15f5f6865c1526085725

          SHA256

          71ba7f47e30b450087c1dcf5fe7fa68c725e1085e10c82b6dcc16021393cd01b

          SHA512

          0480adadb2d2430696fa2e0438b0e5bf788400189c5b3b0cb5d5bf3d73bf8480c7a0f52724757313c94b24b8c2113dbbc3c318d7f1842e970a6755f3361255a2