Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 02:57

General

  • Target

    e138d8e6a37571953f424da6f2d220fa.exe

  • Size

    3.2MB

  • MD5

    e138d8e6a37571953f424da6f2d220fa

  • SHA1

    64de6ebe0f3c50a294e868bad34134e44fd0418b

  • SHA256

    9e1b9539241af217ec2b3697db3a9b2e2b62036b58bfd43ac8969737203cd064

  • SHA512

    aa37195ad909da9ab6de3a7ea3272f8b7e97c48201e82b35760b6c2595a752cfd8d3cc4e5cfc14486f78dcdf93af77f27a047674402d0ef5e0e13a0d9e98278a

  • SSDEEP

    49152:6zG1BqCBGJdodXAGRe5CFHRoHgmAZf1Ny:DBIKRAGRe5K2UZ+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e138d8e6a37571953f424da6f2d220fa.exe
    "C:\Users\Admin\AppData\Local\Temp\e138d8e6a37571953f424da6f2d220fa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7610b3.exe
      C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7610b3.exe 259395763
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 832
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ÅäÖÃ\f7610b3.exe

    Filesize

    3.2MB

    MD5

    1acfc89706222fc6d4e0446db2ae27ce

    SHA1

    3cca9ab3b8bb65ecde78eb6f0269b143a843fc67

    SHA256

    f1dd61b1344752ed744e53eeb3f030332426ba483077da90bf2d49f3b4ba4225

    SHA512

    b1b2f2c56d589da1d42332270f4529ab8e7a003b0682929732ff623806be29ce907db2f56bc437de3ab6ff4c04e33a59dbbe7ebea5d1fe0c782308afa67e3d9b

  • memory/1184-13-0x000000007576D000-0x000000007576E000-memory.dmp

    Filesize

    4KB

  • memory/1184-25-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/1184-26-0x000000007576D000-0x000000007576E000-memory.dmp

    Filesize

    4KB

  • memory/1632-0-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/1632-1-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB

  • memory/1632-11-0x0000000002B80000-0x0000000002F25000-memory.dmp

    Filesize

    3.6MB

  • memory/1632-14-0x0000000000400000-0x00000000007A5000-memory.dmp

    Filesize

    3.6MB