Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 20:50

General

  • Target

    7b3fad053f48326b3d69ce2ef83baf38.exe

  • Size

    7.0MB

  • MD5

    7b3fad053f48326b3d69ce2ef83baf38

  • SHA1

    304a1b55953b91822ee9b3eb4f8c6162eb39cf3e

  • SHA256

    64e5b32569d9f0f8494b23e6ed44b0f5ab5fe96308751cf3c0b0bdbe82d88605

  • SHA512

    0550fd571aed1a96a7925b4d3310bfb35132366cf48d072b6304a5337082c5d9b4c286e61a569c5152e9c1523894aad64a810aed6646cd1c86235bd42ddba9fb

  • SSDEEP

    196608:ad/tGPPLAczgTTgvlHcQZyu2WyYGqGgujZ+FT+8LsOxtl:uULJcT0vlHtZyu2FLv5jtotl

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\is-BACJB.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BACJB.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp" /SL5="$120150,6564690,780288,C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2176

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-522FT.tmp\_isetup\_isdecmp.dll

          Filesize

          29KB

          MD5

          fd4743e2a51dd8e0d44f96eae1853226

          SHA1

          646cef384e949aaf61e6d0b243d8d84ab04e79b7

          SHA256

          6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

          SHA512

          4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

        • \Users\Admin\AppData\Local\Temp\is-BACJB.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp

          Filesize

          2.5MB

          MD5

          5294b3139fb60c325957fc1dd663a494

          SHA1

          0af1a8b3652a7c973322c8b23c2598e462e13fa4

          SHA256

          725b45973382a7fc599eaee8c9eb294d032962c7809852bdec13daa5df90b4cd

          SHA512

          2d19d6abc62e59d59ace9ce56b36ffca59136dc202574433c864558ea66660cdd77fd572b11bb44b63a14ddc4863f4a80bb0c3eee7fc14df842d1c2e37e624cc

        • memory/2016-1-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2016-13-0x0000000000400000-0x00000000004CC000-memory.dmp

          Filesize

          816KB

        • memory/2176-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2176-14-0x0000000000400000-0x0000000000682000-memory.dmp

          Filesize

          2.5MB

        • memory/2176-17-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB