Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-03-2024 13:23

General

  • Target

    ce296760437b4fd4fe7de03de76f1986.exe

  • Size

    209KB

  • MD5

    ce296760437b4fd4fe7de03de76f1986

  • SHA1

    a43a7b472c131b5b4cd0f0e343392bac355430c4

  • SHA256

    58ce1000a10c2ea608213fd0a25e2335680e03f638ba24a11abe3ab6b924ed36

  • SHA512

    99dfe9981a4db0adf7ec2ec9432644a885096e424c0a2e48fd0d387bebc8f0b15254231b24d1b4cac504dc0b9cccf6cae72be114867430f3945511ba034fefaf

  • SSDEEP

    6144:qlsSFhzeSWjfnGO2p+vqxhZLTCi88jVL2iUWxcQ:JUhEyOOVxfSi8annx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce296760437b4fd4fe7de03de76f1986.exe
    "C:\Users\Admin\AppData\Local\Temp\ce296760437b4fd4fe7de03de76f1986.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7214.tmp\vir.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ce296760437b4fd4fe7de03de76f1986.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        PID:2896
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Users\Admin\AppData\Local\Temp\8B7D.tmp\mpress.exe
          "C:\Users\Admin\AppData\Local\Temp\8B7D.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe8B7E.tmp"
          4⤵
          • Executes dropped EXE
          PID:1844
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
          PID:692

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7214.tmp\vir.bat

      Filesize

      1KB

      MD5

      4e23c21b139f85843ed5a855085c9ff4

      SHA1

      fb5326c54dad5988783e5b952f1d42767d543ad1

      SHA256

      1df5dd76bf338aa79ccc3b9dafcfa1c8555cc70f5bda7bb81633c68fb713bfe8

      SHA512

      26a67c403772b5bef89a2f730422099a004262f700b7d5234eb81f66ec58bf5eafb80f28ed28c6a425e45182bc9ed13ac462d6f4cfbeecb6c9fac6be6beab078

    • C:\Users\Admin\AppData\Local\Temp\exe8B7E.tmp

      Filesize

      24KB

      MD5

      6c8375af56ea9d846bb98f244c2f75ec

      SHA1

      f39bbe976b325e9864355bca72648fc1b43c4d2e

      SHA256

      145af7787040412ff1f590420fe90c147d26dc6c3b705121dc3d0da6448c38a7

      SHA512

      7810c64eae600cfdad4d398db90b5a84cfd8936fa626c644a36fc8cbc98a6b16fb37807d75ab7ecdfeb19d10db8b6f07e69046dc4fc2ad80bcba50dd058d821d

    • C:\Users\Admin\AppData\Local\Temp\exe8B7E.tmp

      Filesize

      41KB

      MD5

      bac68e690b1c14dba6029b68bf6485e0

      SHA1

      911ac3beb4e166a4fd3e263787175b257a8a2125

      SHA256

      45422da2885226ab32d568f8155b68c173675a7a5ca058f1e75feddc5229348d

      SHA512

      6ab4ded492eb5c594ba5a0da0eb0f6f812b459de500b9111264276e6eadaefd58e470abb2bebd4c044b689dddd08a919a947417f53d246e4547befc859f5d34a

    • C:\Users\Admin\AppData\Local\Temp\s.dll

      Filesize

      700KB

      MD5

      77ba6153827a203577b5d79c941e801c

      SHA1

      6deb4bdee67f4fb1a01ffa702e7941220c00f5a0

      SHA256

      7df73edded92f9b3f8e0639a4acaac72fdee2358eb0325e5cd66b23b44ce9bf7

      SHA512

      65d6b016a9109dc3358f7952fef0eb520a79a3084cb6da4f30558ebfeaf127f046408366452b178f43fd75d5a077118301326899f0207ed38b96310273824ad2

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      b9dd7ab9d6f863ea416f9ecdb7f39cf1

      SHA1

      d36975e9cd5d8e54fb01186afdecb42e932fa356

      SHA256

      e5886dd9562fee3cfb916fde420a9d063b9cedb408d94ede1805c7c40f6c1d57

      SHA512

      715f1923ac8ce7e3bbc720f66a8bcd249f416202e8ce454fb7a54aea93b24cc8474be29dbd3735c03af8f6bef13418e9c5f6ba9a78dcf1844ca4a631fddffae1

    • C:\Users\Admin\AppData\Local\Temp\vir.bat

      Filesize

      1KB

      MD5

      569039ed2630d4baab69b3f74dfeeaca

      SHA1

      1eb1fe177676d8615cf30805512209c911474cb1

      SHA256

      babd0f937b80d1f752b4805b2cbf04c46895725dc88c7aa5a998cb5e6e30f1d2

      SHA512

      c97b9fc54eac528bd8bcf5c446e1b6c5fbad789e4b1efcdcaae83fb10f29d0348923dfe5b99f843f09e238d76717ebe2ddf5080255f1f746dc0417b0ed6343f0

    • \Users\Admin\AppData\Local\Temp\8B7D.tmp\mpress.exe

      Filesize

      100KB

      MD5

      e42b81b9636152c78ba480c1c47d3c7f

      SHA1

      66a2fca3925428ee91ad9df5b76b90b34d28e0f8

      SHA256

      7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

      SHA512

      4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

    • memory/1844-98-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1844-103-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/2384-0-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2384-114-0x0000000000400000-0x00000000004BF000-memory.dmp

      Filesize

      764KB

    • memory/2912-95-0x0000000000830000-0x0000000000864000-memory.dmp

      Filesize

      208KB

    • memory/2912-97-0x0000000000830000-0x0000000000864000-memory.dmp

      Filesize

      208KB