Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee.exe
Resource
win10v2004-20220721-en
General
-
Target
5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee.exe
-
Size
299KB
-
MD5
5a2905bbc1dda9e50a62a5260cab8d4c
-
SHA1
4d9338c0e56eb7f1f287280bed7ac66b4d30318a
-
SHA256
5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee
-
SHA512
d65a130e013c45653e0bd49d2632bf0da7b0cfd6450ad4d043047e37182bcea07b222e562e1556e25e9b9f3234670105bcad95f20ab401936986a9e02d63f43b
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee.exedescription ioc process File created C:\Windows\Tasks\EasyRésumé.job 5624536f8860ee50ae24bfb658004f6503ffa017ba3ae70c38a35f9db6f703ee.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1432-54-0x0000000076031000-0x0000000076033000-memory.dmpFilesize
8KB
-
memory/1432-55-0x00000000000F0000-0x000000000011F000-memory.dmpFilesize
188KB
-
memory/1432-59-0x0000000000661000-0x0000000000682000-memory.dmpFilesize
132KB
-
memory/1432-60-0x0000000000661000-0x0000000000682000-memory.dmpFilesize
132KB