Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 16:13

General

  • Target

    bc3d561ce6d544e13fc9570980b03360.exe

  • Size

    1.7MB

  • MD5

    bc3d561ce6d544e13fc9570980b03360

  • SHA1

    68a9711402e07b5347af6f6e2d103a201281356b

  • SHA256

    cfc606a0d46c31631bb01699ef0a28f2f58cc2d7badd7a282f39cd1c27620a40

  • SHA512

    2993eb5f7cf191ee3f7883980afe019cc085889febb72d426841ccd460a6a2af5b01630d19c3d80cefabd3e79b3b46451036b523a45e736b39ea988455b6480b

  • SSDEEP

    24576:t4nXubIQGyxbPV0db26WU7qKnusv1Et9uGpckT52zedlq89Ws5uIzk5aM/phdOH:tqe3f6V5fSffPMWrQ0Zky

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe
    "C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\is-ITL9S.tmp\bc3d561ce6d544e13fc9570980b03360.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ITL9S.tmp\bc3d561ce6d544e13fc9570980b03360.tmp" /SL5="$5014C,921114,831488,C:\Users\Admin\AppData\Local\Temp\bc3d561ce6d544e13fc9570980b03360.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2260

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\is-ITL9S.tmp\bc3d561ce6d544e13fc9570980b03360.tmp

          Filesize

          3.0MB

          MD5

          38e9177040663abdf7cb42d237b03d9d

          SHA1

          0b95b3694406d9d86aa3e4953f42d471977ff03d

          SHA256

          2a322dbda4ac86aed04ab99f9f2c277c2f84b6046e234c3ae55ceec53883b594

          SHA512

          78db4c72b2e10d665775e7f306d926060c95ba47610e809e0a21006280f9f0280fa572168b9c9ee00e2121090db9a20dc524677d961fea4292c41c44ba3cb30f

        • \Users\Admin\AppData\Local\Temp\is-SHMLU.tmp\idp.dll

          Filesize

          232KB

          MD5

          55c310c0319260d798757557ab3bf636

          SHA1

          0892eb7ed31d8bb20a56c6835990749011a2d8de

          SHA256

          54e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed

          SHA512

          e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57

        • memory/1688-2-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/1688-14-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/2260-8-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB

        • memory/2260-15-0x0000000000400000-0x000000000071A000-memory.dmp

          Filesize

          3.1MB

        • memory/2260-18-0x0000000000240000-0x0000000000241000-memory.dmp

          Filesize

          4KB