Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 01:29

General

  • Target

    5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.exe

  • Size

    7.8MB

  • MD5

    787ba0ba23b20a464bb90a6a79fe1b0f

  • SHA1

    b2f2d9cc2757e6c6b8707226dc63d5c9d32a9cb9

  • SHA256

    5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c

  • SHA512

    2ad806260d36b1d3ca466447c4d0962cb275ad543d29905fd57b38068fff0e7ec3002bef4fee26b7985a1068a69e5e2dba41a3dd7be3937caa905a61c9d06bf3

  • SSDEEP

    98304:SGybX4vytWdXZ+i3xk8gzDJC3eTIvDwSqSV8RVhaBhaTtCbJghPDEpnXppNZ7Jf4:gmxZNS8gzDJC3lcSV8fha2t8ghL8nXPa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.exe
    "C:\Users\Admin\AppData\Local\Temp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\is-NLCF9.tmp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NLCF9.tmp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.tmp" /SL5="$30142,7669476,573440,C:\Users\Admin\AppData\Local\Temp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.exe"
      2⤵
      • Executes dropped EXE
      PID:1320

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-NLCF9.tmp\5d5e967757d51bebf4a702f2b3ead74cf992f62fed30b2e8d7b500e361bc572c.tmp

    Filesize

    1.6MB

    MD5

    1ee7a65b5fafe84560d0dc6478ec2de3

    SHA1

    bc97a31471e6ff2ea61c85176ccf0914a036f341

    SHA256

    490ebf128dd64bdceb156422d85f90f207d76fc44909064e35c6c6e8c9a1bcbc

    SHA512

    85303be3d683a5716467bab873804c0a7d24bb17ac2e8073c9e44ebab81541de9c1a94a4fab52e8573fbdaf01ebf44fc4bd60e99b652f874963b0726c363245d

  • memory/1320-8-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/1320-11-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/1320-13-0x0000000000400000-0x000000000059B000-memory.dmp

    Filesize

    1.6MB

  • memory/2156-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2156-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2156-10-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2156-15-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB