Analysis

  • max time kernel
    143s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 23:43

General

  • Target

    b9f66ef1ba585f459cf38fbb06f1c559.exe

  • Size

    3.1MB

  • MD5

    b9f66ef1ba585f459cf38fbb06f1c559

  • SHA1

    46ddb8967ed9092681d6e8cd32318ce0b9263413

  • SHA256

    ecdbfea71a088d59faf8ca4529c9d390d6453de442d5d93effd9877347e7804f

  • SHA512

    2d810e2cbc45feb19d55a5303bbcedb58018eb86120e0eeec028d820318306b78c2ec275e9de77ef5f3474a85eebadc257f9186e9fce68086af2f131445b504f

  • SSDEEP

    49152:l/A+Ar4cJBk1aBk1RBk1kBk1FBk14Bk1ubrBqBk1ldBsgCBsgZBsgSBsgXBsgIBE:l/A+ArvxrBjKetmFdSPg/qOGey

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f66ef1ba585f459cf38fbb06f1c559.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f66ef1ba585f459cf38fbb06f1c559.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\autopatch.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\autopatch.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\IXP000.TMP\autopatch.exe

          Filesize

          21KB

          MD5

          dcfb1d995b0b350a5ceb497641cb33a8

          SHA1

          1f2eae7216fa4d23b6996f38ae91ff9c61cf2618

          SHA256

          a70e68b1a47327b46c5a62af1d2c38bfe97f9e2d8153e2cd97181925d66f7430

          SHA512

          629d6e70d69f97014b82d90e19677dd5f2c5e1361f9c747fdeb79c3a54bfe63060fec3c971cc36fdde6efb901d496a490e79cc89012e86f07e860fcbf98fc530

        • memory/1984-12-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB