Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-03-2024 20:14

General

  • Target

    4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe

  • Size

    61KB

  • MD5

    d650c9e024273a0f51ab7a35485a218f

  • SHA1

    0e87d50d5dee0846f6319e7881cb4699cf5de76c

  • SHA256

    4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42

  • SHA512

    76404bbb1324032f611d7f60d0f26988137c422f28de36a35b1f84e2fe8f3059a408b9e54d734a27059ba89a54f9d95c15e0cc965118cd12ef0af1d2f990f911

  • SSDEEP

    768:BeJIvFKPZo2smEasjcj29NWngAHxcwKppEaxglaX5uA:BQIvEPZo6Ead29NQgA2wzle5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe
    "C:\Users\Admin\AppData\Local\Temp\4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      C:\Users\Admin\AppData\Roaming\ewiuer2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\ewiuer2.exe
        C:\Windows\System32\ewiuer2.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
          C:\Users\Admin\AppData\Roaming\ewiuer2.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Windows\SysWOW64\ewiuer2.exe
            C:\Windows\System32\ewiuer2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1776
            • C:\Users\Admin\AppData\Roaming\ewiuer2.exe
              C:\Users\Admin\AppData\Roaming\ewiuer2.exe
              6⤵
              • Executes dropped EXE
              PID:880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7ZS3EJ7J.txt

    Filesize

    225B

    MD5

    e577d1f82df54681986074dc11c2f168

    SHA1

    4568b865db7e72821a88ea824ca4e7296f32ad8a

    SHA256

    b5f19e888057cbb7ce935f9f278e821793bfeab7a5c8c0309b75aaab53721577

    SHA512

    2af2d14f5069f141692db29198425838ec5fdcff297cf6c5491c52f4739f0f9d498dddbcc1f88a7a0c408d5245661990845bfaeb2e1d3a7e3b455303eee66479

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\BLAUI3N4.txt

    Filesize

    226B

    MD5

    d19869b783dc6b0cac1c37ead0d63cc8

    SHA1

    1feed7679fcf77b7b642e48c7f4056c9e5d96289

    SHA256

    d1c60598bac65d161dc8dd6a3297f53957e78a470256ce946fae8871526efed1

    SHA512

    14ed44504c332dbcb9cd6ed79373b09bb85407064c0f07a5eb15a2c612f3f6f78a2ceffc499476a63433832981d543821d8e0701b861f62a6a936420d5f94a28

  • \Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    42669343895ac3bf99efee5fa89cd154

    SHA1

    965ccd10f7e2695e32918e5881781b75082c4c30

    SHA256

    0c85cee420404639d685fec020bbe10e1fd6c47c22a7ebf5bc87006c726d2dc1

    SHA512

    82078ce0e7341627c767464e1dedc8631cf140a63d74146331cb304f5f446b4debba474c30e18e7a28c65a4595789845956f4a9c566bbdf10e3d0d1aafae3223

  • \Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    9ac8e9493e43f1cd81086a81edb2e5ae

    SHA1

    8c7917e411a08603cb82bfcca9a1d8372b4efe74

    SHA256

    b0f8306f0934079b92136519ad04cd8e28708d089d546c37ef349aec08020f9e

    SHA512

    f6901a6d2a8537cf4a0418855b33937933b6b475fbbec5a99b31ce97249daa1ac761ef15937647fd335ffd8ab30c591c514e90b32ab0f6caa014d37e7b47b94e

  • \Users\Admin\AppData\Roaming\ewiuer2.exe

    Filesize

    61KB

    MD5

    d41542e28bc37c8dd23459b78692b527

    SHA1

    4beaf8a1ed062d49f88d46bd2030ef3ee8ed13d1

    SHA256

    6790f471d4394b48da157b64cefa00b368084c8d09fca635623dfc5d32d414c2

    SHA512

    664095f8ce31494ad588c548bf311b280c8138113964f17355dfa8d53a540e10ed935af64e33850ee4c2cd9fbbe1052b22b0e1b0fd0d7430afc0f9a9a41242b2

  • \Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    15e95c6b1e29f040a8d4e9884ff2f639

    SHA1

    ff6e5e868ea69716fc9473a0492065af08664801

    SHA256

    521f97a697e3f1ae7dacc403da57a6960833bcbcd97a05cca183098f71bd7750

    SHA512

    7c348fd03c2567d94f9a9fd73ae16e034269c71f7ad5b7bdda738601e2073ed69f4418c7ff1d467d8604430fa138f3263159836a7fbd5f1406715e5da2db5e8d

  • \Windows\SysWOW64\ewiuer2.exe

    Filesize

    61KB

    MD5

    3a049cf18f9ca7a9b410e86ad1d88146

    SHA1

    5d1c69fe7089b3ba4cc9736774bc1ba01f41a745

    SHA256

    c1f4e2e17d3c84fc4b97866d240ddd9a269c118aa2e90a7a6d65463f50e027bc

    SHA512

    9358e7f5d672004eb5edf61442e49c3e14705b8e61b2bad0c54794a3e9c1ab4ac52e479c3785eb64841a48ce9ff7f91ad7a072a4f3184aaa24fde86fa0803546