Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
07-03-2022 10:31
Static task
static1
Behavioral task
behavioral1
Sample
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe
Resource
win10v2004-en-20220112
General
-
Target
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe
-
Size
987KB
-
MD5
8a09ec6492f6568e0df78f35389d330a
-
SHA1
434a3a2f61f21efc7f5fc3bb9439a174f91b996a
-
SHA256
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2
-
SHA512
45aaf075273f3d377a5ff4614d6e12cf276614cd2d635253cf6cfe5f8fea01cf54893e1cc6bf0b13f311d5c70bb96941cbba7c06740d1bec1de7593ae46fa07e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmppid process 1716 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp -
Loads dropped DLL 1 IoCs
Processes:
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exepid process 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmppid process 1716 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exedescription pid process target process PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp PID 1204 wrote to memory of 1716 1204 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe 15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe"C:\Users\Admin\AppData\Local\Temp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\is-G2SQC.tmp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp"C:\Users\Admin\AppData\Local\Temp\is-G2SQC.tmp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmp" /SL5="$C014E,759200,121344,C:\Users\Admin\AppData\Local\Temp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1716
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-G2SQC.tmp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmpMD5
1a8ac942e4c2302d349caaed9943360d
SHA1a08ce743c3d90a2b713db3e58e747e7a00a32590
SHA256db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96
SHA512d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab
-
\Users\Admin\AppData\Local\Temp\is-G2SQC.tmp\15e9c2b3b351c613e945a937776b63b007be9c24f3999eb91813cb9ed32178d2.tmpMD5
1a8ac942e4c2302d349caaed9943360d
SHA1a08ce743c3d90a2b713db3e58e747e7a00a32590
SHA256db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96
SHA512d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab
-
memory/1204-55-0x0000000075831000-0x0000000075833000-memory.dmpFilesize
8KB
-
memory/1204-56-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1204-58-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1716-62-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB