Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 13:49
Static task
static1
Behavioral task
behavioral1
Sample
0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe
Resource
win10v2004-20220812-en
General
-
Target
0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe
-
Size
524KB
-
MD5
38826150a7796f58566485054d3ee9ca
-
SHA1
4dee1e79d7672a1c054d89c45a5258a4396c1a7d
-
SHA256
0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc
-
SHA512
1424fde9c4f7dd1edf84b8f15dbaac6e7e1398c34e0c6b556293716984cb60430e705f993b69175e4f86efffde5af79608e960b04344870edb32bf21441c2c11
-
SSDEEP
12288:bnvjnEl2QTrzf5MRzWujYmIK/mqulRqmpY/6jphV97nvjH:362Q3ziWwYdR351Hj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 984 ~DFA4F.tmp -
Loads dropped DLL 1 IoCs
pid Process 1048 0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 984 1048 0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe 27 PID 1048 wrote to memory of 984 1048 0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe 27 PID 1048 wrote to memory of 984 1048 0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe 27 PID 1048 wrote to memory of 984 1048 0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe"C:\Users\Admin\AppData\Local\Temp\0247cb948ec98e7a2bbc9ba81fe83cf80886e88070ebd64493bf9b68abe1c5dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\~DFA4F.tmpC:\Users\Admin\AppData\Local\Temp\~DFA4F.tmp OK2⤵
- Executes dropped EXE
PID:984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD56a7036a3c0b3eee2c92ba09ad24b2f4b
SHA1c8306ccc3dcb80635793a8a8e136d22de86c9599
SHA256fcda67aa601a536fb97b1eb26258e2361adabcc56e183aade10c86fb9d498c4f
SHA512c9fff0b00a4629d1b497be2313fb79cb4ffd71edccb23c7a863925332da86292e581f6eb4890182a4d07489cd47bf364bc3e626b0f524c766e1f3aaf233f3b00
-
Filesize
533KB
MD56a7036a3c0b3eee2c92ba09ad24b2f4b
SHA1c8306ccc3dcb80635793a8a8e136d22de86c9599
SHA256fcda67aa601a536fb97b1eb26258e2361adabcc56e183aade10c86fb9d498c4f
SHA512c9fff0b00a4629d1b497be2313fb79cb4ffd71edccb23c7a863925332da86292e581f6eb4890182a4d07489cd47bf364bc3e626b0f524c766e1f3aaf233f3b00