Analysis
-
max time kernel
89s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 02:34
Static task
static1
Behavioral task
behavioral1
Sample
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe
Resource
win10v2004-20220721-en
General
-
Target
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe
-
Size
580KB
-
MD5
4d6a0789205bf65317eb37a2676ca96f
-
SHA1
c4226234299a9b1a5a6d6c0f2aa015d0e14e724b
-
SHA256
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6
-
SHA512
5cbe84f43860b64a3a2a97c7845bd5d2916a2bf48d5cb6482f55fb62844ed29e01801e4650aa198a6e615fd1195d08eecada2a44767da36111fe91b86cc755cb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
xrvb.exepid process 276 xrvb.exe -
Loads dropped DLL 2 IoCs
Processes:
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exepid process 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe -
NTFS ADS 1 IoCs
Processes:
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\gmst\xrvb.exe:ZoneIdentifier c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exepid process 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exedescription pid process target process PID 1904 wrote to memory of 276 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe xrvb.exe PID 1904 wrote to memory of 276 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe xrvb.exe PID 1904 wrote to memory of 276 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe xrvb.exe PID 1904 wrote to memory of 276 1904 c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe xrvb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe"C:\Users\Admin\AppData\Local\Temp\c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\gmst\xrvb.exe"C:\Users\Admin\AppData\Roaming\gmst\xrvb.exe"2⤵
- Executes dropped EXE
PID:276
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
580KB
MD54d6a0789205bf65317eb37a2676ca96f
SHA1c4226234299a9b1a5a6d6c0f2aa015d0e14e724b
SHA256c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6
SHA5125cbe84f43860b64a3a2a97c7845bd5d2916a2bf48d5cb6482f55fb62844ed29e01801e4650aa198a6e615fd1195d08eecada2a44767da36111fe91b86cc755cb
-
Filesize
580KB
MD54d6a0789205bf65317eb37a2676ca96f
SHA1c4226234299a9b1a5a6d6c0f2aa015d0e14e724b
SHA256c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6
SHA5125cbe84f43860b64a3a2a97c7845bd5d2916a2bf48d5cb6482f55fb62844ed29e01801e4650aa198a6e615fd1195d08eecada2a44767da36111fe91b86cc755cb
-
Filesize
580KB
MD54d6a0789205bf65317eb37a2676ca96f
SHA1c4226234299a9b1a5a6d6c0f2aa015d0e14e724b
SHA256c564c0450bd7792b93ffa8e9e238f710e2b5ce46c21de499f83ca764477fdab6
SHA5125cbe84f43860b64a3a2a97c7845bd5d2916a2bf48d5cb6482f55fb62844ed29e01801e4650aa198a6e615fd1195d08eecada2a44767da36111fe91b86cc755cb