Analysis
-
max time kernel
42s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 01:39
Static task
static1
Behavioral task
behavioral1
Sample
56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664.exe
Resource
win10v2004-20220721-en
General
-
Target
56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664.exe
-
Size
308KB
-
MD5
156e697cec29b1ea71b8778ed176604b
-
SHA1
b373e6caee5578b2297819210202ab2ea1f3d784
-
SHA256
56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664
-
SHA512
d68cec25f968068f373ab186918f6ddd84660471664a6db9263e0f34fbb4ad8aebc05eb4c8cb43a85b6372bb84b129d2e8fe4a6d62a4c313fb43f937b6288cae
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664.exedescription ioc process File created C:\Windows\Tasks\ExpertDJ.job 56cd19d2de2dd5d769a0343ccab3712c92e93e7e1fdd73a84806966c84e3e664.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1768-54-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1768-55-0x00000000003A0000-0x00000000003CF000-memory.dmpFilesize
188KB
-
memory/1768-59-0x0000000000190000-0x00000000001C3000-memory.dmpFilesize
204KB
-
memory/1768-60-0x0000000000190000-0x00000000001C3000-memory.dmpFilesize
204KB