Analysis
-
max time kernel
106s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-06-2022 16:08
Behavioral task
behavioral1
Sample
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe
Resource
win7-20220414-en
General
-
Target
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe
-
Size
117KB
-
MD5
ada4085a5d32e6a930ef5a30f798e58d
-
SHA1
f36563de3e43af2d3fcaf706e4bc2f9b177eaa79
-
SHA256
1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc
-
SHA512
91ca02156a111de3d23c3dc23a1682b3066dbd21b075b64f74426a3bd279bf89dd719cbac8f1730a43b8b534ca6811b3d6cd054b5fd163a215da529b4ac6371d
Malware Config
Extracted
gootkit
1234
zalipon.wollega.com
trussardi.qunamti.com
luga5lindalupina.com
-
vendor_id
1234
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe 4512 mstsc.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4872 wrote to memory of 4512 4872 1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe 79 PID 4512 wrote to memory of 2968 4512 mstsc.exe 80 PID 4512 wrote to memory of 2968 4512 mstsc.exe 80 PID 4512 wrote to memory of 2968 4512 mstsc.exe 80 PID 2968 wrote to memory of 1132 2968 cmd.exe 82 PID 2968 wrote to memory of 1132 2968 cmd.exe 82 PID 2968 wrote to memory of 1132 2968 cmd.exe 82 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1132 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe"C:\Users\Admin\AppData\Local\Temp\1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\mstsc.exeC:\Windows\System32\mstsc.exe "C:\Users\Admin\AppData\Local\Temp\1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240582390.bat" "C:\Users\Admin\AppData\Local\Temp\1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\1c402ae634eac550f21d698329fca0c62a50450a5b373f9f492eef2f4fa1a2cc.exe"4⤵
- Views/modifies file attributes
PID:1132
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c0cae19bd38ad9464cd2c4b32ffd8d51
SHA1bf78e086d84eec43e95222bfcf916f0762cc8c8e
SHA2560ab179707dc29bfd558e692dc7965ae02bdeb826581d400d23fd0d97d5b307b9
SHA5126291fe7fef48a490f7f3c25b5209417ccf3c3f63e6ef490c7c7d2118d9465afab3630e8150c43e1b9b671c2a0515614a84fdd19314c274cc58b6284b6dd2259b