Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 01:52
Static task
static1
Behavioral task
behavioral1
Sample
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe
Resource
win10v2004-20220414-en
General
-
Target
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe
-
Size
189KB
-
MD5
cce156bd2542f0ba7ef8be04f71f8213
-
SHA1
43b27bc43f297a01e24794066321d637a76c70e2
-
SHA256
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e
-
SHA512
6fd46f52efb038e69e6b0beaf25793b7d6d7f8d9e677683836ebce3da41c80ddf3ae99d76d501c88e2ccd951f631df12b3fe7fed8d5cba7397c6c1383392f6df
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winolyr.exepid process 964 winolyr.exe -
Loads dropped DLL 2 IoCs
Processes:
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exepid process 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update 9657486 = "C:\\Windows\\5335300410256440\\winolyr.exe" 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update 9657486 = "C:\\Windows\\5335300410256440\\winolyr.exe" 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe -
Drops file in Windows directory 3 IoCs
Processes:
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exedescription ioc process File opened for modification C:\Windows\5335300410256440\winolyr.exe 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe File opened for modification C:\Windows\5335300410256440 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe File created C:\Windows\5335300410256440\winolyr.exe 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exedescription pid process target process PID 884 wrote to memory of 964 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe winolyr.exe PID 884 wrote to memory of 964 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe winolyr.exe PID 884 wrote to memory of 964 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe winolyr.exe PID 884 wrote to memory of 964 884 48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe winolyr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe"C:\Users\Admin\AppData\Local\Temp\48c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\5335300410256440\winolyr.exeC:\Windows\5335300410256440\winolyr.exe2⤵
- Executes dropped EXE
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5cce156bd2542f0ba7ef8be04f71f8213
SHA143b27bc43f297a01e24794066321d637a76c70e2
SHA25648c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e
SHA5126fd46f52efb038e69e6b0beaf25793b7d6d7f8d9e677683836ebce3da41c80ddf3ae99d76d501c88e2ccd951f631df12b3fe7fed8d5cba7397c6c1383392f6df
-
Filesize
189KB
MD5cce156bd2542f0ba7ef8be04f71f8213
SHA143b27bc43f297a01e24794066321d637a76c70e2
SHA25648c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e
SHA5126fd46f52efb038e69e6b0beaf25793b7d6d7f8d9e677683836ebce3da41c80ddf3ae99d76d501c88e2ccd951f631df12b3fe7fed8d5cba7397c6c1383392f6df
-
Filesize
189KB
MD5cce156bd2542f0ba7ef8be04f71f8213
SHA143b27bc43f297a01e24794066321d637a76c70e2
SHA25648c92faf37beda2ea09cea7d094a546d93cd0502a023eddac5d021497ada750e
SHA5126fd46f52efb038e69e6b0beaf25793b7d6d7f8d9e677683836ebce3da41c80ddf3ae99d76d501c88e2ccd951f631df12b3fe7fed8d5cba7397c6c1383392f6df