Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 23:56

General

  • Target

    4a1ccbaad9869a37a032fd2aa03be4a9.exe

  • Size

    606KB

  • MD5

    4a1ccbaad9869a37a032fd2aa03be4a9

  • SHA1

    4d61795023c9c7d4040f6e7091325868ce3bedf4

  • SHA256

    ed07a209026e6ae33832e8873824dc9f1cbf06f2b7698255a0df7ee3ee356151

  • SHA512

    6a6c4345e8b1b324c8abec12ee91d48a32552cdfe7ef888c4f5feef88d22931e81db550ff49ad418a273b553881c0041d8a8a23812efeeedf74432300456006b

  • SSDEEP

    12288:bdEK5HO2efzbp+o/txfaWF3Z4mxxp+43xU4Ak8hTbBUWfTc:bdEnLbn1vQmXt3x7l8ZVPc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9.exe
    "C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE"
        3⤵
          PID:3044
    • C:\Windows\SysWOW64\dll.exe
      C:\Windows\SysWOW64\dll.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2216

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE

      Filesize

      556KB

      MD5

      34d8d594c2894193c37de817c28c6d65

      SHA1

      e149d24d005b0580631f79b7ae9defd63e1dae26

      SHA256

      6af2050b42226ee767badb5688c439e6a838198aa4f98eaaa520fb1b8022c347

      SHA512

      a87a7d4f404c498ab69ea5a59c50074914cd4dbeec21a97edbc98bc1344492179c22958b29b939d87d2bbf969e79ee4140e889251ef8308ba4ebc02918502a7b

    • memory/2164-25-0x0000000000780000-0x00000000007D4000-memory.dmp

      Filesize

      336KB

    • memory/2164-1-0x0000000001000000-0x00000000010A4000-memory.dmp

      Filesize

      656KB

    • memory/2164-2-0x0000000000780000-0x00000000007D4000-memory.dmp

      Filesize

      336KB

    • memory/2164-4-0x0000000003250000-0x0000000003252000-memory.dmp

      Filesize

      8KB

    • memory/2164-3-0x0000000003260000-0x0000000003263000-memory.dmp

      Filesize

      12KB

    • memory/2164-0-0x0000000001000000-0x00000000010A4000-memory.dmp

      Filesize

      656KB

    • memory/2164-20-0x0000000001000000-0x00000000010A4000-memory.dmp

      Filesize

      656KB

    • memory/2164-31-0x0000000000780000-0x00000000007D4000-memory.dmp

      Filesize

      336KB

    • memory/2164-30-0x0000000001000000-0x00000000010A4000-memory.dmp

      Filesize

      656KB

    • memory/2164-23-0x0000000000780000-0x0000000000824000-memory.dmp

      Filesize

      656KB

    • memory/2216-19-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2216-22-0x0000000010000000-0x0000000010093000-memory.dmp

      Filesize

      588KB

    • memory/2220-29-0x0000000010000000-0x0000000010093000-memory.dmp

      Filesize

      588KB

    • memory/2220-21-0x0000000010000000-0x0000000010093000-memory.dmp

      Filesize

      588KB