Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-10-2021 18:24
Static task
static1
Behavioral task
behavioral1
Sample
System.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
System.exe
Resource
win10-en-20210920
General
-
Target
System.exe
-
Size
7.2MB
-
MD5
cfb77c193d16c15b11d47135f960c01a
-
SHA1
94f91401850f8d3ee7ff79dd0224f14df6be8c5b
-
SHA256
5a7b36777c30d22e4fbf640c41c7dccf565268d22e07acd5f9fc12f080989dc7
-
SHA512
05f5c2ad47d20f6047cf7ec1a21185ca1c60a87f890facbb73262ca3855567dfba83d061cb87e311c866162e4485addf106feb9e58679dc883322ec7a4ae73d3
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
Processes:
System.exepid process 512 System.exe 512 System.exe 512 System.exe 512 System.exe 512 System.exe 512 System.exe 512 System.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
System.exedescription pid process target process PID 944 wrote to memory of 512 944 System.exe System.exe PID 944 wrote to memory of 512 944 System.exe System.exe PID 944 wrote to memory of 512 944 System.exe System.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l1-2-0.dllMD5
a506cc854a7c8e845c02309af6e8bb89
SHA1e0ab3c65fe35ce7f1ef66fe4ec422c162cfe2ae7
SHA256d97043a29a2d90ff58c85ba862d9e18dde15f09cdf8c51d71066e6f9c637a709
SHA512b9e687cea76d725512087eefcdb4283131e835e0e616652d0aa85acec64fc3863792b95826b1b2c099ff8a984074265c0e7baeb831a53e5a51c54de1ddd8156e
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l2-1-0.dllMD5
a3e5443ee262fb79604c64c22902a069
SHA12651a2fbf2db5c4baa2a6fd850945a58bc50fdfa
SHA256caef9078861948570147dbdbfcda0786cc080bce39207ba614380745f24e357e
SHA512f80e25c58cf315d44f242b9accbff605c42545425e02a81f57ba2fa73bb41ced4fd08336ce7df93df1b96beb4f18071808fb3a563f962b1b57a6792c9db88b0a
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-localization-l1-2-0.dllMD5
c3f156e9da925fdc82d94ef45668c9db
SHA19e359da6638141c75999ebd9cb785f821eabdf87
SHA25658001341d3ebe4486619a95a7f3513459a4b4a9edb652204e8bf1c3bbc3a9fdf
SHA5126170e2990b715924b2bdbd7715ebd0b61451e23e533e38b63314f25b2fd2bf27da1b7344f86d35a1ae16cb821a504e78ac1e6b91a8a58b584a7c1a3b9079dcff
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-processthreads-l1-1-1.dllMD5
cd09d041f8776aa6d99eb816e659a782
SHA11be998dc0187707884c6aba155aa5e84eacbe64f
SHA2560b63b7c742e46dcf9213fd3179d6f6761d912a97b63fbc25a60e0384fdef6d33
SHA512ac3f572d70b41025890839bd16d774d59c9b34c9328fd991720807dfed2dbe2fd3ecfcd8d143a37d56fd212fe056e2684220d9ff1633270b5bcea6bf8302912a
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-timezone-l1-1-0.dllMD5
2829f5e483811306b6cfcb3608f9940e
SHA134532c2c295928a179b9c41b37d57bee512e0966
SHA256ec22fc858107ecf25c31ed139c71b70ed6e4dc4add0d36b28eb530c37bb5d268
SHA512500e2dc961746284c7a60d1eca6a42b874be00f439d872559d5d8cbc42fa81864e11803c6098d1f6ffff913156b8018a00898458de312e0c0b624ac047356a79
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
C:\Users\Admin\AppData\Local\Temp\_MEI9442\ucrtbase.dllMD5
42573631d628bcbb003aff58813af95e
SHA19644917ed8d1b2a4dae73a68de89bec7de0321ce
SHA256e188604616dccd066abd675883c8c86a4d2bd6a987c57667de6a644652b63443
SHA512d5311a560109feca3f22f5df96f203c644926c27f456902c9d7f062da68bcc0dd5735f6872e765cdfa5119374eb5aa40883809a4608b7a3c21e798a38a3fa680
-
\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l1-2-0.dllMD5
a506cc854a7c8e845c02309af6e8bb89
SHA1e0ab3c65fe35ce7f1ef66fe4ec422c162cfe2ae7
SHA256d97043a29a2d90ff58c85ba862d9e18dde15f09cdf8c51d71066e6f9c637a709
SHA512b9e687cea76d725512087eefcdb4283131e835e0e616652d0aa85acec64fc3863792b95826b1b2c099ff8a984074265c0e7baeb831a53e5a51c54de1ddd8156e
-
\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-file-l2-1-0.dllMD5
a3e5443ee262fb79604c64c22902a069
SHA12651a2fbf2db5c4baa2a6fd850945a58bc50fdfa
SHA256caef9078861948570147dbdbfcda0786cc080bce39207ba614380745f24e357e
SHA512f80e25c58cf315d44f242b9accbff605c42545425e02a81f57ba2fa73bb41ced4fd08336ce7df93df1b96beb4f18071808fb3a563f962b1b57a6792c9db88b0a
-
\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-localization-l1-2-0.dllMD5
c3f156e9da925fdc82d94ef45668c9db
SHA19e359da6638141c75999ebd9cb785f821eabdf87
SHA25658001341d3ebe4486619a95a7f3513459a4b4a9edb652204e8bf1c3bbc3a9fdf
SHA5126170e2990b715924b2bdbd7715ebd0b61451e23e533e38b63314f25b2fd2bf27da1b7344f86d35a1ae16cb821a504e78ac1e6b91a8a58b584a7c1a3b9079dcff
-
\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-processthreads-l1-1-1.dllMD5
cd09d041f8776aa6d99eb816e659a782
SHA11be998dc0187707884c6aba155aa5e84eacbe64f
SHA2560b63b7c742e46dcf9213fd3179d6f6761d912a97b63fbc25a60e0384fdef6d33
SHA512ac3f572d70b41025890839bd16d774d59c9b34c9328fd991720807dfed2dbe2fd3ecfcd8d143a37d56fd212fe056e2684220d9ff1633270b5bcea6bf8302912a
-
\Users\Admin\AppData\Local\Temp\_MEI9442\api-ms-win-core-timezone-l1-1-0.dllMD5
2829f5e483811306b6cfcb3608f9940e
SHA134532c2c295928a179b9c41b37d57bee512e0966
SHA256ec22fc858107ecf25c31ed139c71b70ed6e4dc4add0d36b28eb530c37bb5d268
SHA512500e2dc961746284c7a60d1eca6a42b874be00f439d872559d5d8cbc42fa81864e11803c6098d1f6ffff913156b8018a00898458de312e0c0b624ac047356a79
-
\Users\Admin\AppData\Local\Temp\_MEI9442\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
\Users\Admin\AppData\Local\Temp\_MEI9442\ucrtbase.dllMD5
42573631d628bcbb003aff58813af95e
SHA19644917ed8d1b2a4dae73a68de89bec7de0321ce
SHA256e188604616dccd066abd675883c8c86a4d2bd6a987c57667de6a644652b63443
SHA512d5311a560109feca3f22f5df96f203c644926c27f456902c9d7f062da68bcc0dd5735f6872e765cdfa5119374eb5aa40883809a4608b7a3c21e798a38a3fa680
-
memory/512-56-0x0000000000000000-mapping.dmp
-
memory/944-55-0x000007FEFC461000-0x000007FEFC463000-memory.dmpFilesize
8KB