Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 08:59
Static task
static1
Behavioral task
behavioral1
Sample
98319733830d33ba8fe64960725fd9dd.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
98319733830d33ba8fe64960725fd9dd.exe
Resource
win10-en-20211208
General
-
Target
98319733830d33ba8fe64960725fd9dd.exe
-
Size
14KB
-
MD5
98319733830d33ba8fe64960725fd9dd
-
SHA1
2b1b7cb9c254f72ff2bb08bc568f67d48f207953
-
SHA256
2a1ba880f0cacda99db3eed861bc738a3f8ec6cac2518da431c446851fb4f923
-
SHA512
34ea5ae957e8b4e67238ccf9446f5407ab6cdc22d5947c5cd1816a4b1cced01add5f992b3527642a4486c2d0f5f817ba7bb3554b4369af99f514e443c91b2e7f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
daujtqw.exepid process 1596 daujtqw.exe -
Drops file in Windows directory 2 IoCs
Processes:
98319733830d33ba8fe64960725fd9dd.exedescription ioc process File created C:\Windows\Tasks\corolina17.job 98319733830d33ba8fe64960725fd9dd.exe File opened for modification C:\Windows\Tasks\corolina17.job 98319733830d33ba8fe64960725fd9dd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
98319733830d33ba8fe64960725fd9dd.exepid process 964 98319733830d33ba8fe64960725fd9dd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1252 wrote to memory of 1596 1252 taskeng.exe daujtqw.exe PID 1252 wrote to memory of 1596 1252 taskeng.exe daujtqw.exe PID 1252 wrote to memory of 1596 1252 taskeng.exe daujtqw.exe PID 1252 wrote to memory of 1596 1252 taskeng.exe daujtqw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98319733830d33ba8fe64960725fd9dd.exe"C:\Users\Admin\AppData\Local\Temp\98319733830d33ba8fe64960725fd9dd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:964
-
C:\Windows\system32\taskeng.exetaskeng.exe {301FF60D-E037-443F-B48D-6234A9A37ECF} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\ProgramData\mpeh\daujtqw.exeC:\ProgramData\mpeh\daujtqw.exe start22⤵
- Executes dropped EXE
PID:1596
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\mpeh\daujtqw.exeMD5
98319733830d33ba8fe64960725fd9dd
SHA12b1b7cb9c254f72ff2bb08bc568f67d48f207953
SHA2562a1ba880f0cacda99db3eed861bc738a3f8ec6cac2518da431c446851fb4f923
SHA51234ea5ae957e8b4e67238ccf9446f5407ab6cdc22d5947c5cd1816a4b1cced01add5f992b3527642a4486c2d0f5f817ba7bb3554b4369af99f514e443c91b2e7f
-
C:\ProgramData\mpeh\daujtqw.exeMD5
98319733830d33ba8fe64960725fd9dd
SHA12b1b7cb9c254f72ff2bb08bc568f67d48f207953
SHA2562a1ba880f0cacda99db3eed861bc738a3f8ec6cac2518da431c446851fb4f923
SHA51234ea5ae957e8b4e67238ccf9446f5407ab6cdc22d5947c5cd1816a4b1cced01add5f992b3527642a4486c2d0f5f817ba7bb3554b4369af99f514e443c91b2e7f
-
memory/964-55-0x0000000075F91000-0x0000000075F93000-memory.dmpFilesize
8KB