Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 04:55

General

  • Target

    fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe

  • Size

    313KB

  • MD5

    6ee88251845d006df5ca02d8c79bfbf4

  • SHA1

    a47a734c27b0a1247190387ee1556450d9038364

  • SHA256

    fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1

  • SHA512

    e2fe5eb5cec4b7a7924f17d1799a9b75ae8ce8b9bad4ea8dccf262a4ee47393c35005a4b542a52988251cd40a251c31dff1a16c61475d30232dfca207731edde

  • SSDEEP

    6144:ztvBPnU1b7e9SQii1EkoNlhlrQ2ZrM2xTYAp1ZEGItUoDs22:Zv1nWdQP1EDhZPxTYAp/EGWUoDN2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe
    "C:\Users\Admin\AppData\Local\Temp\fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Program Files (x86)\Microsoft Build\Isass.exe
      "C:\Program Files (x86)\Microsoft Build\Isass.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3056
    • C:\Users\Admin\AppData\Local\Temp\NX_fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe
      "C:\Users\Admin\AppData\Local\Temp\NX_fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe"
      2⤵
      • Executes dropped EXE
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Build\Isass.exe

          Filesize

          213KB

          MD5

          bdbc66f943995a6e90a84dbc52be6521

          SHA1

          eaa4eec26be9f6e362e588a3c27e10f9ace38c7b

          SHA256

          c163b484c60b90a321e56379652328a19db4fa675f0fa809a64cf23d0366fb5e

          SHA512

          e2e5bc0b69aa90dc6f3a27cc9c58769f85270c5ec95086ee17fdb48f52bc6718ea914325a3b7b06cb1181e1e6b9b226e22abb8755c977647a95131a784ea2b01

        • \Users\Admin\AppData\Local\Temp\NX_fcbf42133a6e8a5743b8d70891abbaca6b2ff299ecdeada0262422e089b11df1.exe

          Filesize

          97KB

          MD5

          542d1a85dfc9d47d2ce73c885aaf2b5e

          SHA1

          018f6821486d6381fd536265732ee954993b6646

          SHA256

          14a89eda72e385f76bf15a7c4fd539c48837cf5df444a16f28c5b94f29799550

          SHA512

          33791b1af030a52148b41d5fe76b241b73847429f21c25c8bf79d2165591aa5af9d873e8f7d6c22d2a74176339840a99c2d7f60520c32127962200ee33a93021

        • memory/2836-21-0x0000000004370000-0x0000000005617000-memory.dmp

          Filesize

          18.7MB

        • memory/2836-8-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/2836-12-0x0000000004370000-0x0000000005617000-memory.dmp

          Filesize

          18.7MB

        • memory/2836-18-0x0000000004370000-0x0000000005617000-memory.dmp

          Filesize

          18.7MB

        • memory/2836-17-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-27-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-40-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-22-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-23-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-26-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-19-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-35-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-38-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-39-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-20-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-41-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-42-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-52-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-53-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-54-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-55-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB

        • memory/3056-65-0x0000000000400000-0x00000000016A7000-memory.dmp

          Filesize

          18.7MB