Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 19:03

General

  • Target

    3acf8f746f2e1a1b5d7681cdfdb72e84.exe

  • Size

    525KB

  • MD5

    3acf8f746f2e1a1b5d7681cdfdb72e84

  • SHA1

    37b2379fea3f9feb6092dbe84221cb84fac59776

  • SHA256

    7df1efc18c6787cb6f9d6eb009c7f92f4d7d6fc5404f5b3569f39139acaa3475

  • SHA512

    8f98d1e63a48c8df909df1b9147e828501ce453a3a939f1727b75447b42038351701c54234b3e18ab53dbd362acf054c3cc27eb7c78d2e15b8fbaae08554711e

  • SSDEEP

    12288:ol3h6WdTvq+bsRYWuC/16hwTtN32XaqCOaBH0sZx9kW8Ih:23NNvqIs+dCtVtjH0sZsJIh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3acf8f746f2e1a1b5d7681cdfdb72e84.exe
    "C:\Users\Admin\AppData\Local\Temp\3acf8f746f2e1a1b5d7681cdfdb72e84.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\vbipruzwcrbusx\gidh4afou5xafneajserb.exe
      "C:\vbipruzwcrbusx\gidh4afou5xafneajserb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\vbipruzwcrbusx\tnuabhzmgrva.exe
        "C:\vbipruzwcrbusx\tnuabhzmgrva.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2864
  • C:\vbipruzwcrbusx\ifskzqnwshxr.exe
    zne2n56yaktv "c:\vbipruzwcrbusx\tnuabhzmgrva.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2288
  • C:\vbipruzwcrbusx\tnuabhzmgrva.exe
    C:\vbipruzwcrbusx\tnuabhzmgrva.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\vbipruzwcrbusx\natpwrbqbj2

    Filesize

    6B

    MD5

    0d861899768ebd12044dde0246a47e5c

    SHA1

    d092cb7fd7bc5c6cfa6e771447a253f3b77c6a0f

    SHA256

    0471b6bdea3f341b512b8eeba189cfe531024569c75633eb9f4a4f0162fda817

    SHA512

    536fef34e25b4e327a0e5871ccfafdbd1c406dd13c38a69d05494aff80f033491bf79960ff6e4ded527c4b9a0ec323d4eae12ca6a5ee86143343b6098300f2dc

  • C:\vbipruzwcrbusx\zoqpjdf

    Filesize

    4B

    MD5

    535ff5b1e866a8664253e5cce7aad1e5

    SHA1

    069784fde0c2ff7004f0e4b7f77217bafd906ab1

    SHA256

    3fd3a9b05e4de7a1d0cab8cacd5132dbe55a60d731f0c215c5e1f2460acb882f

    SHA512

    62e0f3958905f04617fa777e45b5249abb8ecdd4786a90b3d9fa9f7c7775f0929cc5e63b4172f08dd9138772ac71a07e77adf13138f24a9c9c22f7bc4939ac2f

  • \vbipruzwcrbusx\gidh4afou5xafneajserb.exe

    Filesize

    525KB

    MD5

    3acf8f746f2e1a1b5d7681cdfdb72e84

    SHA1

    37b2379fea3f9feb6092dbe84221cb84fac59776

    SHA256

    7df1efc18c6787cb6f9d6eb009c7f92f4d7d6fc5404f5b3569f39139acaa3475

    SHA512

    8f98d1e63a48c8df909df1b9147e828501ce453a3a939f1727b75447b42038351701c54234b3e18ab53dbd362acf054c3cc27eb7c78d2e15b8fbaae08554711e