Analysis
-
max time kernel
122s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe
Resource
win10v2004-20220414-en
General
-
Target
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe
-
Size
717KB
-
MD5
273c7a9d3e159add52e5550dd66f1a45
-
SHA1
db2d210c1e356528dc9c0abfdba8f8851aaa920e
-
SHA256
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0
-
SHA512
29cc47a8cd39a61029ba622799ea58d9de5b5e0b8484bbd642aef62d5e8f3db7b8125cb8d45919b01c0398334bd0b25ce93ff18a2771e43d08549747f2cfd327
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
expleo.exepid process 1392 expleo.exe -
Loads dropped DLL 2 IoCs
Processes:
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exepid process 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe -
NTFS ADS 1 IoCs
Processes:
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe:ZoneIdentifier 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exepid process 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exedescription pid process target process PID 1464 wrote to memory of 1392 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe expleo.exe PID 1464 wrote to memory of 1392 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe expleo.exe PID 1464 wrote to memory of 1392 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe expleo.exe PID 1464 wrote to memory of 1392 1464 84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe expleo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe"C:\Users\Admin\AppData\Local\Temp\84e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe"C:\Users\Admin\AppData\Roaming\sgbns\expleo.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
717KB
MD5273c7a9d3e159add52e5550dd66f1a45
SHA1db2d210c1e356528dc9c0abfdba8f8851aaa920e
SHA25684e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0
SHA51229cc47a8cd39a61029ba622799ea58d9de5b5e0b8484bbd642aef62d5e8f3db7b8125cb8d45919b01c0398334bd0b25ce93ff18a2771e43d08549747f2cfd327
-
\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
717KB
MD5273c7a9d3e159add52e5550dd66f1a45
SHA1db2d210c1e356528dc9c0abfdba8f8851aaa920e
SHA25684e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0
SHA51229cc47a8cd39a61029ba622799ea58d9de5b5e0b8484bbd642aef62d5e8f3db7b8125cb8d45919b01c0398334bd0b25ce93ff18a2771e43d08549747f2cfd327
-
\Users\Admin\AppData\Roaming\sgbns\expleo.exeFilesize
717KB
MD5273c7a9d3e159add52e5550dd66f1a45
SHA1db2d210c1e356528dc9c0abfdba8f8851aaa920e
SHA25684e2fe66f9b37b9969358e66f3a290d5027d60a17fe3b0122cc13abb17eab5f0
SHA51229cc47a8cd39a61029ba622799ea58d9de5b5e0b8484bbd642aef62d5e8f3db7b8125cb8d45919b01c0398334bd0b25ce93ff18a2771e43d08549747f2cfd327
-
memory/1392-57-0x0000000000000000-mapping.dmp
-
memory/1464-54-0x00000000754A1000-0x00000000754A3000-memory.dmpFilesize
8KB
-
memory/1464-58-0x0000000000400000-0x00000000004B9000-memory.dmpFilesize
740KB