Analysis
-
max time kernel
117s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
30-09-2021 20:28
Static task
static1
Behavioral task
behavioral1
Sample
422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe
-
Size
2.3MB
-
MD5
8642406e609c7d9cd085d69862c2d4c3
-
SHA1
60e7c3172025a993882d6b180d4b74f3287893ef
-
SHA256
422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010
-
SHA512
c6d357bbb69379990fa31ec8a958ec5a5cb8b0f80870e72fc67e06049975bde3f998fae22e7ae9974cbbf53a56e6129bb8b6e4db5459028e7327ee238e277d82
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2364 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp -
Loads dropped DLL 3 IoCs
pid Process 2364 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp 2364 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp 2364 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2364 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2364 2056 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe 70 PID 2056 wrote to memory of 2364 2056 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe 70 PID 2056 wrote to memory of 2364 2056 422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe"C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\is-FVQ86.tmp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp"C:\Users\Admin\AppData\Local\Temp\is-FVQ86.tmp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp" /SL5="$7007A,1569491,780800,C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2364
-