Analysis
-
max time kernel
186s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-05-2022 11:06
Static task
static1
Behavioral task
behavioral1
Sample
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe
Resource
win10v2004-20220414-en
General
-
Target
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe
-
Size
740KB
-
MD5
356ffed6c9fba266c5c6055de86c6eb8
-
SHA1
d7fa14b3ac053012ff02cc37c268d3906e09aa20
-
SHA256
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a
-
SHA512
9db6be41410522f7e4b89b9aa1ba0f006fa1bca152746469dccb69e71c44f2b71adb5c1bf06d57e2de4e528fa9f773aced27da4b8ed550ca288730c5a954523c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
expleo.exepid process 1724 expleo.exe -
Loads dropped DLL 2 IoCs
Processes:
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exepid process 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe -
NTFS ADS 1 IoCs
Processes:
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe:ZoneIdentifier f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exepid process 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exedescription pid process target process PID 932 wrote to memory of 1724 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe expleo.exe PID 932 wrote to memory of 1724 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe expleo.exe PID 932 wrote to memory of 1724 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe expleo.exe PID 932 wrote to memory of 1724 932 f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe expleo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe"C:\Users\Admin\AppData\Local\Temp\f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe"C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
740KB
MD5356ffed6c9fba266c5c6055de86c6eb8
SHA1d7fa14b3ac053012ff02cc37c268d3906e09aa20
SHA256f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a
SHA5129db6be41410522f7e4b89b9aa1ba0f006fa1bca152746469dccb69e71c44f2b71adb5c1bf06d57e2de4e528fa9f773aced27da4b8ed550ca288730c5a954523c
-
\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
740KB
MD5356ffed6c9fba266c5c6055de86c6eb8
SHA1d7fa14b3ac053012ff02cc37c268d3906e09aa20
SHA256f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a
SHA5129db6be41410522f7e4b89b9aa1ba0f006fa1bca152746469dccb69e71c44f2b71adb5c1bf06d57e2de4e528fa9f773aced27da4b8ed550ca288730c5a954523c
-
\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
740KB
MD5356ffed6c9fba266c5c6055de86c6eb8
SHA1d7fa14b3ac053012ff02cc37c268d3906e09aa20
SHA256f593967ee685669377a3890dac409d06c741d75978d3bb646b37e3bdad23361a
SHA5129db6be41410522f7e4b89b9aa1ba0f006fa1bca152746469dccb69e71c44f2b71adb5c1bf06d57e2de4e528fa9f773aced27da4b8ed550ca288730c5a954523c
-
memory/932-54-0x00000000755C1000-0x00000000755C3000-memory.dmpFilesize
8KB
-
memory/932-59-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB
-
memory/1724-57-0x0000000000000000-mapping.dmp