Analysis
-
max time kernel
67s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-06-2022 20:08
Static task
static1
Behavioral task
behavioral1
Sample
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
Resource
win10v2004-20220414-en
General
-
Target
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe
-
Size
1.4MB
-
MD5
0cff6c361737377f9eefb9d42a8040ef
-
SHA1
d9062f7e2d60be35b942793ebc12833b4b5e35c5
-
SHA256
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253
-
SHA512
e8e584d4a3d36336436714bd392e2e3228526467fd77d22f2219ba3169fcfb06d1d526f8a57d37153d53f564e5fbd2a2aefbe2ef7ba1c4242162bff5930162c4
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1364 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exedescription pid process target process PID 2024 set thread context of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exepid process 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 2000 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exepid process 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exedescription pid process target process PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2024 wrote to memory of 2000 2024 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe PID 2000 wrote to memory of 1364 2000 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe cmd.exe PID 2000 wrote to memory of 1364 2000 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe cmd.exe PID 2000 wrote to memory of 1364 2000 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe cmd.exe PID 2000 wrote to memory of 1364 2000 251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe"C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exeC:\Users\Admin\AppData\Local\Temp\251d43cb566daff217cf009beb982b097dde00b67e2d4d2637f5379a6b264253.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\558GJD~1.BAT"3⤵
- Deletes itself
PID:1364
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201B
MD58094cf68a43aa14d10602f6a152ad0b4
SHA1554b5f71d35e357f5142d55a95fcd53a4faa6ad1
SHA256ed0535af2d1480402f60b7a47ed25f46553ecab5036806e45161bfa35f7c3578
SHA512762d9ae2335db978f65149980fa6388ae30386646b22c0e8f50effb6b802b48e321b487b05fbe36422185728f01025c6db17139d227331f29592ca2feeafab17