Analysis

  • max time kernel
    839s
  • max time network
    841s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:43

General

  • Target

    911d5905cbe1dd462f171b7167cd15b9.exe

  • Size

    138KB

  • MD5

    911d5905cbe1dd462f171b7167cd15b9

  • SHA1

    bca38ab2f4b461e25e4686cfe523d3b0ed2d1cd0

  • SHA256

    8c42a084278ff8e25f7ee765c37da84da02780da725505108f9eb39cfb05c051

  • SHA512

    c60c274360040b2385fcfbc1f9cbc85cd48c9872d0cadcfbe0343efb16e5401af1b74159ecd29d5adeb519c2818bde022fd21b20c12e4dfb274351733d38b7d1

  • SSDEEP

    1536:IhcFu21x8xUoDq88z/1h5jOla6H7uTnkwwZI0qXAREZ+QOS4D0rtJ/lxABC:7DnoDjbin/w1O3D5J/lxABC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\911d5905cbe1dd462f171b7167cd15b9.exe
    "C:\Users\Admin\AppData\Local\Temp\911d5905cbe1dd462f171b7167cd15b9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1724
    • \Users\Admin\AppData\Roaming\msiexec.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3844

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\msiexec.exe

    Filesize

    125KB

    MD5

    a190da6546501cb4146bbcc0b6a3f48b

    SHA1

    443aac22d57edd4ef893e2a245b356cba5b2c2dd

    SHA256

    5ae0bf71e770c2959fe2022c43e4c6f43e361089a3431aa3180ebf4ec0465cac

    SHA512

    688a548138a961b29fb740a8c18b32afdfe115da7f8fc579041a771e4eb6da0d6370698e89d2fc74f236153b1919e2d70f51819054cfa43a5386fb8222b8c640

  • memory/1724-3-0x0000000000080000-0x0000000000097000-memory.dmp

    Filesize

    92KB

  • memory/1724-610-0x0000000001000000-0x0000000001001000-memory.dmp

    Filesize

    4KB

  • memory/1724-16-0x0000000003C30000-0x0000000003D39000-memory.dmp

    Filesize

    1.0MB

  • memory/1724-614-0x0000000001040000-0x0000000001041000-memory.dmp

    Filesize

    4KB

  • memory/1724-613-0x0000000001030000-0x0000000001031000-memory.dmp

    Filesize

    4KB

  • memory/1724-612-0x0000000001020000-0x0000000001021000-memory.dmp

    Filesize

    4KB

  • memory/1724-611-0x0000000001010000-0x0000000001011000-memory.dmp

    Filesize

    4KB

  • memory/1724-20-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB

  • memory/1724-609-0x0000000000D10000-0x0000000000D11000-memory.dmp

    Filesize

    4KB

  • memory/1724-2-0x0000000000A10000-0x0000000000B3D000-memory.dmp

    Filesize

    1.2MB

  • memory/1724-615-0x00000000011A0000-0x0000000001211000-memory.dmp

    Filesize

    452KB

  • memory/1724-18-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

    Filesize

    4KB

  • memory/1724-17-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

    Filesize

    4KB

  • memory/1724-1-0x0000000000060000-0x000000000007F000-memory.dmp

    Filesize

    124KB

  • memory/1724-0-0x00000000008C0000-0x000000000095F000-memory.dmp

    Filesize

    636KB

  • memory/1724-15-0x00000000018B0000-0x0000000001979000-memory.dmp

    Filesize

    804KB

  • memory/3844-617-0x0000000020060000-0x0000000020072000-memory.dmp

    Filesize

    72KB

  • memory/3844-941-0x0000000001AE0000-0x0000000001B08000-memory.dmp

    Filesize

    160KB

  • memory/3844-780-0x0000000001AE0000-0x0000000001B08000-memory.dmp

    Filesize

    160KB

  • memory/3844-621-0x0000000001AE0000-0x0000000001B08000-memory.dmp

    Filesize

    160KB

  • memory/3844-965-0x0000000001AE0000-0x0000000001B08000-memory.dmp

    Filesize

    160KB

  • memory/3844-619-0x000007FFFFFD3000-0x000007FFFFFD4000-memory.dmp

    Filesize

    4KB

  • memory/3844-643-0x0000000001AE0000-0x0000000001B08000-memory.dmp

    Filesize

    160KB