Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 05:01
Static task
static1
Behavioral task
behavioral1
Sample
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
Resource
win10v2004-20220721-en
General
-
Target
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
-
Size
348KB
-
MD5
34d1dc2e81e5547d79a51f62b05dee3a
-
SHA1
679ab050deaf4f32844bacfb24ed35de1c07bf8f
-
SHA256
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545
-
SHA512
91e56091907dcb653596d3d5df2770cc738156d6a8c808bd32aa603e1f1dbfb137c1007d788999c3eb2a353116943ce1cbde0d323e7e22c17042cb64af90b1fa
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Drops file in Windows directory 1 IoCs
Processes:
5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exedescription ioc process File created C:\Windows\Tasks\EatRight.job 5633c8eb30f051c754cfaccbc25b96a308445e588d39d666cf6fbf0e252b4545.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4892-130-0x0000000000990000-0x00000000009BF000-memory.dmpFilesize
188KB