Analysis
-
max time kernel
152s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 15:47
Static task
static1
Behavioral task
behavioral1
Sample
12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe
Resource
win10v2004-20220812-en
General
-
Target
12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe
-
Size
48KB
-
MD5
0739bcbaf96687353917cf3d1f57b8ea
-
SHA1
66a297677e9ca5528ebd5c4088b6ba3b0851e043
-
SHA256
12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9
-
SHA512
0bf0b9fb5258c6da1f8de1398df7eb1c9a20a03c48fca9aa65e35dd0cc03a56abc8ffa60c03e37ff326032a02bb05bea3eeca6b3a0eeedf483daf7deadd4f51d
-
SSDEEP
768:BtENkybNoQOJ4hUO3J9vaUZGjX6k4PVPo7vXKCC6FQb:BtENH6O3J5aUIjXqPtoj8yQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4952 smss.exe 2324 smss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\smss.exe 12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe File created C:\Windows\system\smss.exe 12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1392 3196 12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe 79 PID 3196 wrote to memory of 1392 3196 12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe 79 PID 3196 wrote to memory of 1392 3196 12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe 79 PID 1392 wrote to memory of 4952 1392 cmd.exe 81 PID 1392 wrote to memory of 4952 1392 cmd.exe 81 PID 1392 wrote to memory of 4952 1392 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe"C:\Users\Admin\AppData\Local\Temp\12302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system\smss.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\system\smss.exeC:\Windows\system\smss.exe3⤵
- Executes dropped EXE
PID:4952
-
-
-
C:\Windows\system\smss.exeC:\Windows\system\smss.exe1⤵
- Executes dropped EXE
PID:2324
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD50739bcbaf96687353917cf3d1f57b8ea
SHA166a297677e9ca5528ebd5c4088b6ba3b0851e043
SHA25612302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9
SHA5120bf0b9fb5258c6da1f8de1398df7eb1c9a20a03c48fca9aa65e35dd0cc03a56abc8ffa60c03e37ff326032a02bb05bea3eeca6b3a0eeedf483daf7deadd4f51d
-
Filesize
48KB
MD50739bcbaf96687353917cf3d1f57b8ea
SHA166a297677e9ca5528ebd5c4088b6ba3b0851e043
SHA25612302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9
SHA5120bf0b9fb5258c6da1f8de1398df7eb1c9a20a03c48fca9aa65e35dd0cc03a56abc8ffa60c03e37ff326032a02bb05bea3eeca6b3a0eeedf483daf7deadd4f51d
-
Filesize
48KB
MD50739bcbaf96687353917cf3d1f57b8ea
SHA166a297677e9ca5528ebd5c4088b6ba3b0851e043
SHA25612302cd615c4b963aeb94bc716d144aa1207f06b7b6c7aadb96e2cbc26cfa8c9
SHA5120bf0b9fb5258c6da1f8de1398df7eb1c9a20a03c48fca9aa65e35dd0cc03a56abc8ffa60c03e37ff326032a02bb05bea3eeca6b3a0eeedf483daf7deadd4f51d