Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
25-10-2021 15:21
Static task
static1
Behavioral task
behavioral1
Sample
microsoft-service.file.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
microsoft-service.file.exe
Resource
win10-en-20210920
General
-
Target
microsoft-service.file.exe
-
Size
8.7MB
-
MD5
ea68e41df9270259b9132fb4939ccb9f
-
SHA1
317f2b5d2a7ed69abb121f9a59502a5dd9d8c00e
-
SHA256
314302e1fee3d78fa6c3ce096ed2f87fb87124255eee67b42d422c6525680abd
-
SHA512
7f2659935956d93869ae373e1283a09b59a9ba6911332a84635ea330ab983a1a539c345bc621de009e7cd70a8a28a97835609e740e69ada56ca995427873469b
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
microsoft-service.file.exepid process 1360 microsoft-service.file.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
microsoft-service.file.exedescription pid process target process PID 908 wrote to memory of 1360 908 microsoft-service.file.exe microsoft-service.file.exe PID 908 wrote to memory of 1360 908 microsoft-service.file.exe microsoft-service.file.exe PID 908 wrote to memory of 1360 908 microsoft-service.file.exe microsoft-service.file.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\microsoft-service.file.exe"C:\Users\Admin\AppData\Local\Temp\microsoft-service.file.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\microsoft-service.file.exe"C:\Users\Admin\AppData\Local\Temp\microsoft-service.file.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI9082\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
\Users\Admin\AppData\Local\Temp\_MEI9082\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
memory/1360-55-0x0000000000000000-mapping.dmp