Analysis
-
max time kernel
48s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 05:07
Static task
static1
Behavioral task
behavioral1
Sample
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
Resource
win10v2004-20220721-en
General
-
Target
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
-
Size
207KB
-
MD5
4ae0ff18081fba1fbccd2b8acfa6b5c6
-
SHA1
83168dd947c574452f3cc46d7598e73da6f10124
-
SHA256
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d
-
SHA512
002f0afe183c5772ba387a8907795bc6e77034908b01df632ab2b77931137990ed7b0b2bcf20e2b4bd471636e157f322cf9fe2130ec7713086abdd3b2fe9fa48
Malware Config
Signatures
-
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
suricata: ET MALWARE ETag HTTP Header Observed at JPCERT Sinkhole
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
Processes:
562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exedescription ioc process File created C:\Windows\Tasks\FreeTracks.job 562fc011dc0839d65f98d8a39d4e8a042966498b9489a8d741d3cfac78b8181d.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1616-54-0x00000000754F1000-0x00000000754F3000-memory.dmpFilesize
8KB
-
memory/1616-55-0x0000000000130000-0x000000000015F000-memory.dmpFilesize
188KB
-
memory/1616-59-0x0000000001431000-0x0000000001452000-memory.dmpFilesize
132KB
-
memory/1616-60-0x0000000001431000-0x0000000001452000-memory.dmpFilesize
132KB