Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 17:15

General

  • Target

    729760d208d4bd2ceef37717ce6148c2.exe

  • Size

    776KB

  • MD5

    729760d208d4bd2ceef37717ce6148c2

  • SHA1

    351100a366a2b3050e6eac0d75963b5c3081abb4

  • SHA256

    880f3e4cbcbd14361b568e6e38f12dab0ef623aae64bfa1e39cbdd5b5cac9f50

  • SHA512

    4cc0be77e3f721f7afefe9653ffe96d94d74bd6c2ab3d458299ac32fae02162470d97cbe159f77ce20fb1de60d07e8586b3a670dd7b2b2f16ad4d744dc380053

  • SSDEEP

    12288:5na9oi4F0IAa548D5gQZHWata+2CzSXU5NL+CSPzuQjIstcvS38LCJQBtdGs1rBw:5naSkaZVHWa7GEMIakS3rJQBtUkBgJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe
    "C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp" /SL5="$3012E,433886,54272,C:\Users\Admin\AppData\Local\Temp\729760d208d4bd2ceef37717ce6148c2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp

    Filesize

    73KB

    MD5

    799b7d524b9669552e64cbab8b85f950

    SHA1

    93aa37ff499998d72aff3b4d921eea2ba86e2ea4

    SHA256

    73f4944d6d284f1f06924028e4b954faa20dd95e7850f17f58ea8055e7443105

    SHA512

    7a72a9f72616a504599cb4755bb0b0f3b65e880dd4b0831e94d5282de61e6decd3a316cd08d166a0482bbeefb9deb3ab1cf5b1d6586778dae1f2541a67e30f4d

  • C:\Users\Admin\AppData\Local\Temp\is-OCSST.tmp\Games.inf

    Filesize

    259B

    MD5

    c9db0b7a1497a721ecb2692a83b2d3c8

    SHA1

    07a35b088a8cf909cdadb551772e45177461c7bf

    SHA256

    3d9f4f64d306fcadfc37e1c84c219059dacd63e9a492a663d4f780d2fa0ec134

    SHA512

    e9ee21d68ce95c6676be40d9bec0adaa9920fdf51f9d778c0ac7bff36a07736faf1b3342478a9bd34718763295af9fc75c020ad1eec56d6115014864eaad52cf

  • \Users\Admin\AppData\Local\Temp\is-O4CCR.tmp\729760d208d4bd2ceef37717ce6148c2.tmp

    Filesize

    126KB

    MD5

    3cd642e3019f3326572b2f03747ac3a5

    SHA1

    30e93dd01f24d715b48555e4bf8db2236b7839e1

    SHA256

    f39b9e174424d5f6210362789ad69cfcd2e22a3fe54e96a571de701552087aa7

    SHA512

    c15b601a91e469ee579b711bf5ba0376e024b8e69ff156a914ff4707f4b1914a3c3ce1f679d2ec8d910b5e530e27aa7a1856669cd819c2213d6acab374dc3bcf

  • \Users\Admin\AppData\Local\Temp\is-OCSST.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-OCSST.tmp\_isetup\_shfoldr.dll

    Filesize

    8KB

    MD5

    468e4f658084fa350469b4d9f4221cb6

    SHA1

    1090bcce7758f30a9974daf99c5bece07589d3e8

    SHA256

    f832fb2b0f4a7fd1e8acee9bad4bf0ba7697939e42e8675fa352ebc02bfc9e2f

    SHA512

    a381d23242a8d0117241a741a42f35b5407732405d831fbb284236ce2564ebbe9ed8c9178194989d51dfcc6a1eca8dcc1e7f8cdd843fc32379bff4e4e03cb240

  • \Users\Admin\AppData\Local\Temp\is-OCSST.tmp\isxdl.dll

    Filesize

    1KB

    MD5

    c47fba22a433b368596405ec17330071

    SHA1

    69817481bfca2db34ac65dab83630a0c4952af8d

    SHA256

    48c1b4d2da869d1535d61d338e3f56b1e9994b9b82355f894fe843d901842e2b

    SHA512

    0d4504893dbb1c9ca312e38b181d00303d9e763376668fadaf08a659f1c117ddc3163ae071c04d20b7af25137813e489c1ea866f73b0cc8f63b49a3e68891dc3

  • \Users\Admin\AppData\Local\Temp\is-OCSST.tmp\itdownload.dll

    Filesize

    45KB

    MD5

    6d5bae7333e6e3be95d51cb3d98ceb5d

    SHA1

    de9df9cb573ed1a69baf80c1432fec7a8533138e

    SHA256

    8387fdcc4c9036283bc65452f023924dbcf0a4941c744d757ac82fdf550dc895

    SHA512

    d08505a1fd42fdeb6c75e4641e28629f6227594e5e3f569378fc88a2858187bfc71552eb7204054e7165dd18e10f9d0749020495d31fee20f61c6273d244151b

  • memory/2928-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2928-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2928-35-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2996-18-0x00000000007D0000-0x000000000080C000-memory.dmp

    Filesize

    240KB

  • memory/2996-8-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/2996-37-0x00000000007D0000-0x000000000080C000-memory.dmp

    Filesize

    240KB

  • memory/2996-36-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2996-41-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB