Analysis

  • max time kernel
    142s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 08:01

General

  • Target

    98e58a223371323e1c0ac5f632a2393d.exe

  • Size

    209KB

  • MD5

    98e58a223371323e1c0ac5f632a2393d

  • SHA1

    2f387fc20697178cd5718557378d04c2565876dd

  • SHA256

    9d313f2d3a69082875c128c9000ff213b7dcaf83c9bf0b352194b222baeacb6b

  • SHA512

    176bf5bacd4d0d5496635676fcebfed421e68d306a9c50b5f9d7a3c187170bc592953548a54084ed31ad999135c9c8ae0f141675fa2d70bad06e53c315659b59

  • SSDEEP

    3072:Tl/Oe4vhx1lX176mdohytUqjz+Mww7FXsQExxQMuQULl2WjfROVoUber8vwQbOeX:TlH4JfRd7yaUeqQ+ePdLU1eCwQB5hN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98e58a223371323e1c0ac5f632a2393d.exe
    "C:\Users\Admin\AppData\Local\Temp\98e58a223371323e1c0ac5f632a2393d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\4AB6.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 98e58a223371323e1c0ac5f632a2393d.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Users\Admin\AppData\Local\Temp\4CD8.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\4CD8.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4CD9.tmp"
          4⤵
          • Executes dropped EXE
          PID:2832
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:312
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:2388

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4AB6.tmp\vir.bat

            Filesize

            1KB

            MD5

            a3421d9efba58e2b7d5a6ef5cd02b514

            SHA1

            fa5fa9a311563d71676ec70673f7d8e659a9907a

            SHA256

            d682685de05f2574348bcd07f4ee43039c821813307adca6b861af7c5403b65a

            SHA512

            17984de0658c69544a572b0046f6a729381a45c9fa2f72f2f866239753bb6a384355100176cb8a7b1a896f48048da03db3bf537cf332bd460bed6f3834239d6c

          • C:\Users\Admin\AppData\Local\Temp\exe4CD9.tmp

            Filesize

            43KB

            MD5

            d0ae8ca54890d52697b4d58a4c18cc5d

            SHA1

            7eb22f1bdc4410c95b0096bf997da72daba21637

            SHA256

            54572b7ccbc2d2a9e640c5140bf0a5d43649b4c8cc8531c503d20f81ef9d0862

            SHA512

            fa3ec5d3a901719a02600e01f4ca4faa168c991260c71f1d6697ecc36b76a0ad10eb207581c3c198bc2f58613fcfeaafe561e77adc80f934e00bffa40ef2da4f

          • C:\Users\Admin\AppData\Local\Temp\exe4CD9.tmp

            Filesize

            25KB

            MD5

            db8d020f7e2eed3ea5e5cc05df028ae0

            SHA1

            03ce05995f2bda5f042f5a6b53321b80630b15d0

            SHA256

            f4f7f65023d33028d97aedbd5dd1a470c640e0312de96d9b14837ee36c013658

            SHA512

            d6a37bdde114d778551014016cb9e40148ba9fa456e4684450e68c3cb07fc895a5ffd7e934004b08a9092eba60a59153b52fcb8ca38f85a20111b0ab63bca63b

          • C:\Users\Admin\AppData\Local\Temp\exe4F49.tmp

            Filesize

            41KB

            MD5

            5a16fb75977e1799ed52f35a164922e6

            SHA1

            c1697c61c42498f0501a886392ddd2560646b24c

            SHA256

            f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de

            SHA512

            1e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216

          • C:\Users\Admin\AppData\Local\Temp\s.dll

            Filesize

            700KB

            MD5

            863c312b1e74b57dc2d01a1370684ff3

            SHA1

            39175536b2783f4b3d70cb29d3352388cfebbcac

            SHA256

            33c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a

            SHA512

            d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            43c4ffdec302a298d32b478c782c9859

            SHA1

            1d4b82e4a273162b1c3cb6d9ab1c2c930bc5f61a

            SHA256

            53ebb82d3445426bb97559b09ee1054fbffaea98615319b9a3b74789a4c71fca

            SHA512

            6539fd532c637aef0c80f81b0dc4fd91f1835053628d14a5a3b3f29b500e58bf2f9b8ec7b14b9f5d72e19bbd64d4cc960c8e15bb55b3720ca1e3940582ab201e

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            608c0dc08d53756d813b2793dd43c409

            SHA1

            210b7d7f65af60272861c53cab38afbb201d2c47

            SHA256

            c1e14517184282f404f360e22fc7cafc29575ebb629130f003715b397858b09a

            SHA512

            bfbfbc542cacaac30770cd59ca1c35e6051026e6377532b698372ac9920fd9dc38fe0e1f5b0d61658c7d631487f3a36e8c1abf0aa14130a3b5b1de657f25baca

          • \Users\Admin\AppData\Local\Temp\4CD8.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • memory/2056-0-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2056-112-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2336-65-0x0000000000510000-0x0000000000544000-memory.dmp

            Filesize

            208KB

          • memory/2336-66-0x0000000000510000-0x0000000000544000-memory.dmp

            Filesize

            208KB

          • memory/2832-74-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2832-68-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB