Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 17:02

General

  • Target

    b7eae23fecfbf30aa5476c7129e8e8fe.exe

  • Size

    208KB

  • MD5

    b7eae23fecfbf30aa5476c7129e8e8fe

  • SHA1

    d747dbec2e36a24f9695b0601d686fb6baac0a23

  • SHA256

    d8e015987ba4ae7c8249c9ef0d4810bdaaeb4a78910cd33f52273bf60f6aa140

  • SHA512

    2e2814581eb64f6f7e3b4d522f2a65a42f3ead32b38fdcf39fbc8105bb66b4ab022d7a35c58f645ad78562c3f2e19c392de9de24bfe04e68858ef7a9445ee613

  • SSDEEP

    6144:Rl0n6aurwlfCBdNmUzbxcPxeLppHe3nL8T/:In6aurwlqZbxcPwLy3u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7eae23fecfbf30aa5476c7129e8e8fe.exe
    "C:\Users\Admin\AppData\Local\Temp\b7eae23fecfbf30aa5476c7129e8e8fe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\1545.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save b7eae23fecfbf30aa5476c7129e8e8fe.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2472
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2704
        • C:\Users\Admin\AppData\Local\Temp\312E.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\312E.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe312F.tmp"
          4⤵
          • Executes dropped EXE
          PID:1572
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:2756

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1545.tmp\vir.bat

            Filesize

            1KB

            MD5

            194d70876631e64ecd6328853a71b0d8

            SHA1

            64ba776c544fc5f98d612292c51d1bf658a99f92

            SHA256

            d5280a9f04c6ae950b75ca55a332eed2dff2ce7d5eb2e0e5b0e996795dcfcba9

            SHA512

            4c39607795b1adca5707caf461e6a0ae2149caa1ead1eabbe834eabf6ba6a5bd0cbb8bcaa82516379e6df08765893685cd19ec3f4b45f952d15d4688b8dae12c

          • C:\Users\Admin\AppData\Local\Temp\312E.tmp\mpress.exe

            Filesize

            100KB

            MD5

            e42b81b9636152c78ba480c1c47d3c7f

            SHA1

            66a2fca3925428ee91ad9df5b76b90b34d28e0f8

            SHA256

            7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

            SHA512

            4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

          • C:\Users\Admin\AppData\Local\Temp\exe312F.tmp

            Filesize

            41KB

            MD5

            7aa367dca7be65e07b16bd69f06263e3

            SHA1

            d447739251408f8e8490a9d307927bfbe41737ce

            SHA256

            738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076

            SHA512

            d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3

          • C:\Users\Admin\AppData\Local\Temp\exe312F.tmp

            Filesize

            207KB

            MD5

            5c8f9a1066119dccaf7e3a3aadb31b34

            SHA1

            a284592f9d878c5ec3b524d4630074b7d72c42f3

            SHA256

            55053a5a17c83669902250dd3d0299dd83bdc2b28460eb0d7c0da2378dd11828

            SHA512

            ac0b13ceeb82ed55cfe20e63149b7bfd70f7b91b3672b37fd10838ffb8b0a6e10d249bea0cb6949d7d3a13827b71e2d52c7ad4ce9ce855365091780391027da0

          • C:\Users\Admin\AppData\Local\Temp\exe312F.tmp

            Filesize

            741KB

            MD5

            fede3b152faf828326a1966a63d0ce68

            SHA1

            03673b268f912613e6de2dcebd79efa4cd9b9915

            SHA256

            9945f0e7e578397ab4addf6e01fde79c2983e20c01120477a59d932c6866aefd

            SHA512

            b1f253bb479c81644182ff1854e8bed70616d8824464c2d60b3000791b84afb0fa5be1128d4369cb8540680fcd71bbb4554d8c67336383d0504e8dda6b5487b1

          • C:\Users\Admin\AppData\Local\Temp\s.dll

            Filesize

            700KB

            MD5

            3c9568b0d86a865f9f73d9c0967cfdad

            SHA1

            3270df3e0e600f4df2c3cbc384837693a8a3a83e

            SHA256

            c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6

            SHA512

            bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            283570478a3ef4f7da0bd288285bae8c

            SHA1

            cb0f56b245760eb0b43bbba4d1097ca0ba29401c

            SHA256

            62b99f93eede37eaadd050a81ba51fd91bd2bfe345c8a124352427d2d839dfa4

            SHA512

            634026cc16a08674ecc2a53a13bfb6c54b4ceec32f056de099b10e6682c7adec73d536d13b0ef4100b5498537bbf1381e3677f17a153824aee16ae4ed18b1c2a

          • C:\Users\Admin\AppData\Local\Temp\vir.bat

            Filesize

            1KB

            MD5

            d451920bf82e0b62c4cf25d0a3c2284e

            SHA1

            2e21d21ed8a26a2029f5badcb41b95c32ba188b8

            SHA256

            cb8785135d376cb7de0512f9969fe318985abcc9dbe50b6abd6f21fc1a5e7f0f

            SHA512

            48e0e1c6ce883b1b6e9e1351fafc606706675ae5554249fe526fa5b25ca15b8f57ec8617cf059b11ccbdea384f4f39e681fe3b23de1705b452c190294b292aae

          • memory/1572-96-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/1572-102-0x0000000000400000-0x0000000000434000-memory.dmp

            Filesize

            208KB

          • memory/2132-0-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2132-113-0x0000000000400000-0x00000000004BF000-memory.dmp

            Filesize

            764KB

          • memory/2704-89-0x0000000001D30000-0x0000000001D64000-memory.dmp

            Filesize

            208KB

          • memory/2704-94-0x0000000001D30000-0x0000000001D64000-memory.dmp

            Filesize

            208KB