Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2024 14:39

General

  • Target

    639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe

  • Size

    11.9MB

  • MD5

    e31cc2191508fe25b1f0b4ad880447da

  • SHA1

    4ed873eb8117df1c5be589ee206113357b269bef

  • SHA256

    639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316

  • SHA512

    83d6957360eae733ced62bc99fe88ce77d44011db154478cb6947e9d7d3e03598162a86ff7a1ca2b21ce2d06b719fbaa24dd42a60c344b2a24f861c65833d87a

  • SSDEEP

    196608:KBlctqPNu4y4DzphkPoOoR8p1f+z08FD8uvs/djg7Cl+mRygga0hoJoii+zL0Dki:bQlu4yWcPolRQN+fFYuvs/djg7C81gpE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe
    "C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp" /SL5="$40112,11599674,1028096,C:\Users\Admin\AppData\Local\Temp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp

    Filesize

    550KB

    MD5

    2e742c56240fa482f7a0a54b7e33f0bf

    SHA1

    254ac95f22219aa6635910012ec81d7b97b52c57

    SHA256

    c42d5111fe5162f62bfdce6428122282703734dae875b83e990a9f28f149213c

    SHA512

    dbc0397b7b4021c3e9afe62b92493b7ca54d3d3d928c9488b3f45e91a9b6bee6540787c95f873ee21db8b0dd797cca870b2528bf4b77c6d4630049d7303dafdb

  • \Users\Admin\AppData\Local\Temp\is-F9UR9.tmp\639be9fbce027224e64fcebc79286c370e6743a3a5a833dca0b17971b727d316.tmp

    Filesize

    774KB

    MD5

    43949ea559eee12dd0ce5c7e115a5f5e

    SHA1

    0424a5bc020d47dd5554ae6f0257673046fc454d

    SHA256

    8d9b9b7c5d36ebc03900c87280cc43e646b2da74ec14daba1343ca0593f01fd3

    SHA512

    bb7932e257b36da7d91a93b80646ae30ace874c17c265aa3b98a2803a23c83a2838d66a00d7f4c7d0cc8ecb6c8a71f380b45c7ed61b5560093744fa0adb5dd8d

  • \Users\Admin\AppData\Local\Temp\is-MB5CQ.tmp\_isetup\_isdecmp.dll

    Filesize

    28KB

    MD5

    077cb4461a2767383b317eb0c50f5f13

    SHA1

    584e64f1d162398b7f377ce55a6b5740379c4282

    SHA256

    8287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64

    SHA512

    b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547

  • memory/2140-1-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/2140-13-0x0000000000400000-0x0000000000508000-memory.dmp

    Filesize

    1.0MB

  • memory/2876-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2876-14-0x0000000000400000-0x0000000000746000-memory.dmp

    Filesize

    3.3MB

  • memory/2876-17-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB