Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 07:52

General

  • Target

    7c90de99d5d2411b057ed47de247cbc7.exe

  • Size

    2.7MB

  • MD5

    7c90de99d5d2411b057ed47de247cbc7

  • SHA1

    47118089438fcb8cc7f1484d416357c3a657feea

  • SHA256

    694e6e3e36015ef4215eb6ec910f0ef6585177294896ede7c9530b669e650605

  • SHA512

    7e209336aa24c33077abd32a5ddf33bd70036ac383b25146c0702195b6737909b40bd385d530874149e52c19453c09a5be4bdfe5deb3c8a3663da24c92541e28

  • SSDEEP

    49152:3U5DRfniMLZmgANK/JXwG6VbgQEHJWU3pI5lxJhkWLl+Gs3olXXGblqnLSKhj0K:k5t0I/VwDV0B3CLl+GsAalqLxj9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c90de99d5d2411b057ed47de247cbc7.exe
    "C:\Users\Admin\AppData\Local\Temp\7c90de99d5d2411b057ed47de247cbc7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\is-SDRBG.tmp\7c90de99d5d2411b057ed47de247cbc7.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SDRBG.tmp\7c90de99d5d2411b057ed47de247cbc7.tmp" /SL5="$30150,2446194,121344,C:\Users\Admin\AppData\Local\Temp\7c90de99d5d2411b057ed47de247cbc7.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-SDRBG.tmp\7c90de99d5d2411b057ed47de247cbc7.tmp

    Filesize

    1.1MB

    MD5

    90fc739c83cd19766acb562c66a7d0e2

    SHA1

    451f385a53d5fed15e7649e7891e05f231ef549a

    SHA256

    821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

    SHA512

    4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

  • \Users\Admin\AppData\Local\Temp\is-SSEJ0.tmp\idp.dll

    Filesize

    232KB

    MD5

    55c310c0319260d798757557ab3bf636

    SHA1

    0892eb7ed31d8bb20a56c6835990749011a2d8de

    SHA256

    54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

    SHA512

    e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

  • \Users\Admin\AppData\Local\Temp\is-SSEJ0.tmp\isxdl.dll

    Filesize

    121KB

    MD5

    48ad1a1c893ce7bf456277a0a085ed01

    SHA1

    803997ef17eedf50969115c529a2bf8de585dc91

    SHA256

    b0cc4697b2fd1b4163fddca2050fc62a9e7d221864f1bd11e739144c90b685b3

    SHA512

    7c9e7fe9f00c62cccb5921cb55ba0dd96a0077ad52962473c1e79cda1fd9aa101129637043955703121443e1f8b6b2860cd4dfdb71052b20a322e05deed101a4

  • memory/792-8-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/792-16-0x00000000020E0000-0x0000000002102000-memory.dmp

    Filesize

    136KB

  • memory/792-20-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/792-23-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2008-1-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2008-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB