Analysis
-
max time kernel
108s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-02-2021 13:47
Static task
static1
Behavioral task
behavioral1
Sample
561d04cdab555035186aaeeb01e72c21.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
561d04cdab555035186aaeeb01e72c21.exe
Resource
win10v20201028
General
-
Target
561d04cdab555035186aaeeb01e72c21.exe
-
Size
6.6MB
-
MD5
561d04cdab555035186aaeeb01e72c21
-
SHA1
da5e2a7f0d2ba3249375c739ebc4e5bb7537d1aa
-
SHA256
47d4e69644220048b1034fbfe2f4af533c4a43fd17bd4dafc563fd32134ddd36
-
SHA512
95fa8b57cb37d278aafeaf922ebb6388b6bf3fe2612a69ee9525ce8b128597480653a0c786a9e41533947e5e39e849823f8fd6766b88e767923792134d464591
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
561d04cdab555035186aaeeb01e72c21.exepid process 1972 561d04cdab555035186aaeeb01e72c21.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
561d04cdab555035186aaeeb01e72c21.exepid process 1972 561d04cdab555035186aaeeb01e72c21.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
561d04cdab555035186aaeeb01e72c21.exedescription pid process target process PID 1064 wrote to memory of 1972 1064 561d04cdab555035186aaeeb01e72c21.exe 561d04cdab555035186aaeeb01e72c21.exe PID 1064 wrote to memory of 1972 1064 561d04cdab555035186aaeeb01e72c21.exe 561d04cdab555035186aaeeb01e72c21.exe PID 1064 wrote to memory of 1972 1064 561d04cdab555035186aaeeb01e72c21.exe 561d04cdab555035186aaeeb01e72c21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\561d04cdab555035186aaeeb01e72c21.exe"C:\Users\Admin\AppData\Local\Temp\561d04cdab555035186aaeeb01e72c21.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\561d04cdab555035186aaeeb01e72c21.exe"C:\Users\Admin\AppData\Local\Temp\561d04cdab555035186aaeeb01e72c21.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI10642\python39.dllMD5
11c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
\Users\Admin\AppData\Local\Temp\_MEI10642\python39.dllMD5
11c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
memory/1972-2-0x0000000000000000-mapping.dmp
-
memory/1972-5-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmpFilesize
8KB