Analysis

  • max time kernel
    142s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 08:46

General

  • Target

    488806365a2a0911408c682883b7b7ad.exe

  • Size

    209KB

  • MD5

    488806365a2a0911408c682883b7b7ad

  • SHA1

    be83f2db42215334d28dc8991762cca03aeac327

  • SHA256

    32894a28236bb9400a375bef40fc928af67640fd3d216bcc9776bf00b5fb68fd

  • SHA512

    22480f20cac87b0b2eda3c592869da6a125c8c34145a2c6bfcaf57881205149b38bb1f617092638a5e578883ca4ca7bd8ef95e8dd4fcd71695479332ac51e88d

  • SSDEEP

    6144:wlGRgXm15ibLGHf7juW00byM7YOsIprxKhmYb:xv14GHfPuW00bmOsi0T

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\488806365a2a0911408c682883b7b7ad.exe
    "C:\Users\Admin\AppData\Local\Temp\488806365a2a0911408c682883b7b7ad.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\5DD9.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:2792
        • C:\Users\Admin\AppData\Local\Temp\u.dll
          u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1216
        • C:\Users\Admin\AppData\Local\Temp\u.dll
          u.dll -bat vir.bat -save 488806365a2a0911408c682883b7b7ad.exe.com -include s.dll -overwrite -nodelete
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2828
    • C:\Users\Admin\AppData\Local\Temp\601A.tmp\mpress.exe
      "C:\Users\Admin\AppData\Local\Temp\601A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe601B.tmp"
      1⤵
      • Executes dropped EXE
      PID:2148
    • C:\Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe
      "C:\Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe5EA5.tmp"
      1⤵
      • Executes dropped EXE
      PID:2556

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\5DD9.tmp\vir.bat

      Filesize

      1KB

      MD5

      0b519fd57abb84b2e71602fcd5579389

      SHA1

      7a1d1c07051a0169ed2479d70d58890ede362d55

      SHA256

      4a186fd031e605cec95ee7e20814abda62388d86b3a0a4f89d4fe9deda585117

      SHA512

      c8a95a9ed9d4232c0b7991d441e2fc0424f27881cb91463f045411d0e79981c372ec5f547ed33cd68aa1803d6e23753350e3b53ea9db8ace1823972af217b984

    • C:\Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe

      Filesize

      57KB

      MD5

      d335050c36c81c0057ceacbfdf9d9643

      SHA1

      5fbaf2c93b0207d96620d6c2273022d7baf528b3

      SHA256

      29d3babcc7f059f611ef66042255675a778e588f89d1f853a72a5ad2ce4fc890

      SHA512

      0d79c28b49a50053109bd2a50bfecc73549abbcd2fce52b559a99b5a8801c601c206ab874eac3e725e1dd3df849c5b3782244c97ad935a393e63e3ae194acdd7

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      92KB

      MD5

      ace4bef1eaa126302be21c4105cc6ea3

      SHA1

      227744c90647355a13c84178f9fedac3f75fdb97

      SHA256

      8a675772564f80e1e7c4e51cbb64e1ba19990a010b112abc5f050100a6765c66

      SHA512

      b4909dc9aabd8f478717a08e14648bc131b6176ac794991bd174f61dff9c3d15b0635352cce622e8088515fafbc447dd15717b3c2001ba34f86a19ba2abc4029

    • C:\Users\Admin\AppData\Local\Temp\u.dll

      Filesize

      700KB

      MD5

      e52e1dacca253a95205caebdf9ba61be

      SHA1

      89b934078b0ebb6045bcc17eee3395fc3af688ca

      SHA256

      bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621

      SHA512

      98cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      e8db1743c61ef9a0bcc4c2909670e86e

      SHA1

      7c74d2e38505b50c9ff7c6bbade770c13d202445

      SHA256

      68595c379108300fd6a12996dd6b7aa41f1f4cf5979eaac4d34aa29cad588234

      SHA512

      63ded50454fd41baf0690dcd0c1da0c722b018e4ae19898cdc43742863a90cb101d0da6a6e1dac87be0ac475cf498121f37c0ce03d6b20ecb2effe51f4514f67

    • \Users\Admin\AppData\Local\Temp\5EA4.tmp\mpress.exe

      Filesize

      13KB

      MD5

      9679056f9ba721ed5e6beb4656f20f20

      SHA1

      858f9f75bfca4215f14b18cb20eb2df50c56cfc8

      SHA256

      7c9a2e9d340e401b9a1bb0b1dc58ad6ecf17bc722bcf1809d5ae54efe45ac90e

      SHA512

      6f781e66f29dfdf661e76a98e4971b00db822bc7577aed12b5d4d150fefd570dd4e37b0bf6909625f5ade1aae767302fdf0709e5ae7f1e959342ad00f375b930

    • memory/2148-145-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2148-140-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2180-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2180-154-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2556-76-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2556-69-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2828-67-0x0000000000310000-0x0000000000344000-memory.dmp

      Filesize

      208KB

    • memory/2828-71-0x0000000000310000-0x0000000000344000-memory.dmp

      Filesize

      208KB