Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
02-11-2021 21:44
Static task
static1
Behavioral task
behavioral1
Sample
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe
Resource
win10-en-20211014
General
-
Target
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe
-
Size
12.6MB
-
MD5
bdcd6016c61d04f4f3e2d21c350df022
-
SHA1
128d115e1ff7431484ee749e5cbcde7d393de651
-
SHA256
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b
-
SHA512
81150b565715584b2218857e8e002914a4ed1afe7f8d137651670701843d4184b1826c27e919209be40adeb33a4a5d3e7871484217c416e39dd0a9e002e3c127
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exepid process 1420 af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exedescription pid process target process PID 1060 wrote to memory of 1420 1060 af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe PID 1060 wrote to memory of 1420 1060 af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe PID 1060 wrote to memory of 1420 1060 af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe"C:\Users\Admin\AppData\Local\Temp\af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe"C:\Users\Admin\AppData\Local\Temp\af619936fa29b7d0cf0c8441674bbf062cea427f9aaad4ea3173b5942956720b.bin.exe"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI10602\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
\Users\Admin\AppData\Local\Temp\_MEI10602\python39.dllMD5
7e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
memory/1420-55-0x0000000000000000-mapping.dmp