Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 00:58
Static task
static1
Behavioral task
behavioral1
Sample
843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe
Resource
win10v2004-20220901-en
General
-
Target
843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe
-
Size
88KB
-
MD5
67268a0d684199431457a0e10cb45baa
-
SHA1
59a075153b3d24590d2e5c1be930098b73033467
-
SHA256
843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
-
SHA512
19dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
SSDEEP
768:9cgOLtbX156mlGxIoRVRv4UA/9gCEnZJQ:2FX1ggGxZZ0/xMJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2008 mdktask.exe 1252 mdktask.exe -
Loads dropped DLL 4 IoCs
pid Process 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 2008 mdktask.exe 2008 mdktask.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mdktask.exe 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe File opened for modification \??\c:\windows\SysWOW64\mdktask.exe 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 2008 mdktask.exe 1252 mdktask.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2008 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 26 PID 1424 wrote to memory of 2008 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 26 PID 1424 wrote to memory of 2008 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 26 PID 1424 wrote to memory of 2008 1424 843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe 26 PID 2008 wrote to memory of 1252 2008 mdktask.exe 27 PID 2008 wrote to memory of 1252 2008 mdktask.exe 27 PID 2008 wrote to memory of 1252 2008 mdktask.exe 27 PID 2008 wrote to memory of 1252 2008 mdktask.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe"C:\Users\Admin\AppData\Local\Temp\843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
\??\c:\windows\SysWOW64\mdktask.exec:\windows\system32\mdktask.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
\??\c:\windows\SysWOW64\mdktask.exec:\windows\system32\mdktask.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c
-
Filesize
88KB
MD567268a0d684199431457a0e10cb45baa
SHA159a075153b3d24590d2e5c1be930098b73033467
SHA256843d8f64c711eb148db149c94fbb41b4705610e14928eaf4ffda52e3b70f7d2d
SHA51219dca4ad4df72209ce308af160c9a2bea23f5c4daab1ac86c11ccf5309108aad25e8116ba1261ca2b26f137a09e6b1428659adb159b522434d2450e6afb7e25c