Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 00:07

General

  • Target

    95b9b51cfe0796540645738824c7ba37.exe

  • Size

    212KB

  • MD5

    95b9b51cfe0796540645738824c7ba37

  • SHA1

    25bea9b86cda5fa6c298f4b4f5c47417558317be

  • SHA256

    89ab3f300162c3ea2cd0b5fe9d829b30d89eef34476b4379960a8283c018c21b

  • SHA512

    c00eb3ba24345d30f29dc9ca6d1c2c44f4df7dac0fe890fc50de77db6e19c66f9bfc8ae56a696d66222770f6fcb5382cbeba434833b89133de771122d17cf009

  • SSDEEP

    6144:ElcpdZcrWUdMDVWjuIVESYac33G76/ErvlyX0z:HjOdMDLIVCae2u/ELl1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95b9b51cfe0796540645738824c7ba37.exe
    "C:\Users\Admin\AppData\Local\Temp\95b9b51cfe0796540645738824c7ba37.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\1B7C.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 95b9b51cfe0796540645738824c7ba37.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:1644
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\3765.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\3765.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe3766.tmp"
          4⤵
          • Executes dropped EXE
          PID:2312
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:1576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1B7C.tmp\vir.bat

      Filesize

      1KB

      MD5

      c61a339c6b870784e035e78ecc60fa79

      SHA1

      24e14691b1121fc8b3773fa6f37361815abde0a2

      SHA256

      434eea4a97349ed6fe82dd02594e86b3713b48b8791cbed4202375bd1a89a688

      SHA512

      7841e6f0185f15f2c870e0c5f9cdf7ba65c27c93e3100a0c7db090a9090d3ad96668d659c9fa516ec249b009aa40e0a6b9bc6cf02be9119c072f9ec3ca97f113

    • C:\Users\Admin\AppData\Local\Temp\exe3766.tmp

      Filesize

      41KB

      MD5

      32604a5eed1e29f05e32b1c84f070240

      SHA1

      3f494c93260a37b2f3addb820c6a39b9d5850f87

      SHA256

      9cdd4c8322c5d7bfe73cb767b4c716151f9116488736bd455092e8060216fce0

      SHA512

      b3dbbf9a5602f259b9e9b438233e41e051330d2748423a3b0f1f65541e80777bbfd95b44c5576cc23c1940cba6ed38b3fbdc3e662518ce8bc63aaac522a70131

    • C:\Users\Admin\AppData\Local\Temp\exe3766.tmp

      Filesize

      25KB

      MD5

      30b93300f8cf8459d771a21c45cae7f3

      SHA1

      fbdd696afde6f5b99cd7eebc9210d08d93744250

      SHA256

      9696cfdbde562901d706815ab13bac0c3adce123ab5583597f9f22ecaa534043

      SHA512

      83f5866194485beea1e4c38aa14a5ce945f6bdaaeda395ca5256f81e53586aa190415c606322a6244a3b887c02eb72d5b1454e3ece9771a5f0549dafb2e29c60

    • C:\Users\Admin\AppData\Local\Temp\exe3766.tmp

      Filesize

      42KB

      MD5

      b90ddebed9c67a7a3339225649a74609

      SHA1

      32be0513b600f53ed274271c49d3b0d6c87ab593

      SHA256

      4ffa1779b01c50f0d3d0238234f67f4a6f84cc3fb5e02cc7de52bc3a3878b277

      SHA512

      c4b325de3f5fc0123b7bb62aa5ae4224a4de37ead560686ded1e40db2b6baa7c55c06b125ee5e33f74396944493ad9945a41f322af6ab2d233cc6f8121b5be87

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      700KB

      MD5

      b7e0c62e9ae4f3b408da602cc27c0d3b

      SHA1

      e313c16659880528b3c72b5ca36699898f5a8587

      SHA256

      566f0eeb5de3b198b1365a0aa58e72711fd74645403c92d3e78683d7608013a4

      SHA512

      7a901eba9dfe8dc9c8d6670b1791079bb2fe33ba86f4b3481e08378def2100c87537232d6e3aabd6594975f9dfd658ae23fab2071a21b62d950541e9a9546dbe

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      225158ce5eec20a3c8068cf388730485

      SHA1

      2e4030f8a20d672a33eafee8fb3ad8ce0ebfdbdd

      SHA256

      a7a07dd7553ed7e10bb9c90463b9ef29e28dbeddff450ff97af10eb51a9d16a5

      SHA512

      35e000b0a0d8852e46d0d5f0967a4f900f7030469bff8d999a39bfed3236015a04d1160b8dfc0fa3bede66b1276b276acf9236d1a2d663b89beed73d587fba05

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      a9949e567fc9de0cb29453e85f091665

      SHA1

      caadf233e2cd73cfa1e3b642c618eea011ac4787

      SHA256

      0689fdfa1d234a318af5d32774676b736e4fdaaefd0140372ff617712e657529

      SHA512

      47863656298517e2fbc06edfdce759dea785c3f36654e2ed10236d865e54a40e87b4190752372d9271eca2f6ed56eda13ecf08cc1e5d9ad9ab1e66908c5ecfbe

    • \Users\Admin\AppData\Local\Temp\3765.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • memory/2220-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2220-112-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2312-96-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2312-101-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2724-92-0x0000000000380000-0x00000000003B4000-memory.dmp

      Filesize

      208KB

    • memory/2724-94-0x0000000000380000-0x00000000003B4000-memory.dmp

      Filesize

      208KB