Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 13:06

General

  • Target

    568a5b71f9807eb6a4ddf26285dd949a.exe

  • Size

    51KB

  • MD5

    568a5b71f9807eb6a4ddf26285dd949a

  • SHA1

    832b5583214f50c4ea31e732879faef0dd245529

  • SHA256

    6302ed025efc3902f2b8a18430f9f78956b0acf43710a75c5cdf82d98ef6eb35

  • SHA512

    5a36f2c07560a8fad21581b08be920d2adb7af3e6140963279dfb165f144965a7d6997d056317549819d62b5eed20b090929079bbb4c00fc671f2075ddd95e64

  • SSDEEP

    1536:UF+qxQcJxJljitFbOlFu2a+PpcVioN43:ObxJT9m4lFuH+ci

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe
    "C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe
      C:\Users\Admin\AppData\Local\Temp\568a5b71f9807eb6a4ddf26285dd949a.exe
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Windows\SysWOW64\servet.exe
        C:\Windows\system32\servet.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\servet.exe
          C:\Windows\SysWOW64\servet.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:2884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\Deledomn.bat
        3⤵
        • Deletes itself
        PID:2988

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Deledomn.bat

    Filesize

    184B

    MD5

    4106016dc915abc93553d47fdc84497c

    SHA1

    7a503ff7ea13fd8d17e2e0600d2bea4e8fe7c763

    SHA256

    22683421055ce9f9a9129b800912c7c4de471b69713677ef4042b2f34b3d288d

    SHA512

    ad8577f9916697a7cfeb73e8ab63830aa171aa1834571cb496868b662a59df0a331e1b1a88816ade4d8a7c13d4ddec628e77a24bdb7808cc2f1dd1807d7dc393

  • \Windows\SysWOW64\servet.exe

    Filesize

    51KB

    MD5

    568a5b71f9807eb6a4ddf26285dd949a

    SHA1

    832b5583214f50c4ea31e732879faef0dd245529

    SHA256

    6302ed025efc3902f2b8a18430f9f78956b0acf43710a75c5cdf82d98ef6eb35

    SHA512

    5a36f2c07560a8fad21581b08be920d2adb7af3e6140963279dfb165f144965a7d6997d056317549819d62b5eed20b090929079bbb4c00fc671f2075ddd95e64

  • memory/1996-2-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2116-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2116-3-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2116-27-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2680-18-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2884-26-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2884-28-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB