Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 17:00
Behavioral task
behavioral1
Sample
c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe
Resource
win10v2004-20220901-en
General
-
Target
c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe
-
Size
26KB
-
MD5
15e44d585c8775f14ff49d3f43669869
-
SHA1
d8c3284b92e2c67e0d8d2de0af1ae3e564e312ff
-
SHA256
c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9
-
SHA512
a495908bc875f9bd9adaa48eeea7b10f75a41328f1460ebd0d5f4f8c9499e4ac01316f2b61e097a120b0923d58e843c3b0a336045a350fc9a916cdd4ff55af64
-
SSDEEP
768:J1NAUsbxtT6sFst/3IrdlLUwknbcuyD7UVC:J1NAUwtT6sFstwrbUBnouy8
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hεsts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hεsts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
resource yara_rule behavioral1/memory/1492-61-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1152 1492 c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe 28 PID 1492 wrote to memory of 1152 1492 c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe 28 PID 1492 wrote to memory of 1152 1492 c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe 28 PID 1492 wrote to memory of 1152 1492 c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe 28 PID 1152 wrote to memory of 1684 1152 cmd.exe 29 PID 1152 wrote to memory of 1684 1152 cmd.exe 29 PID 1152 wrote to memory of 1684 1152 cmd.exe 29 PID 1152 wrote to memory of 1684 1152 cmd.exe 29 PID 1152 wrote to memory of 1388 1152 cmd.exe 30 PID 1152 wrote to memory of 1388 1152 cmd.exe 30 PID 1152 wrote to memory of 1388 1152 cmd.exe 30 PID 1152 wrote to memory of 1388 1152 cmd.exe 30 PID 1152 wrote to memory of 284 1152 cmd.exe 31 PID 1152 wrote to memory of 284 1152 cmd.exe 31 PID 1152 wrote to memory of 284 1152 cmd.exe 31 PID 1152 wrote to memory of 284 1152 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1388 attrib.exe 284 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe"C:\Users\Admin\AppData\Local\Temp\c61db59e52fbfce2d8532d4b0128fd3c2436acf7e88283f85302f208e69024b9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DE6.tmp\troy_bez_mail.bat""2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\notepad.exeC:\Windows\notepad.exe3⤵PID:1684
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h -s "C:\Windows\system32\drivers\etc\hosts"3⤵
- Views/modifies file attributes
PID:1388
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\drivers\etc\hosts"3⤵
- Views/modifies file attributes
PID:284
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD555d56d84d4b7c4ff2315e34e607437f6
SHA1fd77ddfe96d39110dbb11b4e42d3c11e9e3ecac6
SHA256788bbb0ab94bd16e74e914b7c9f2e0b170b66be6d39a0d81e1cc5a099b92215b
SHA512c9f855233e8082d5aee7ceed41c3b911d3cfe85214ac02b99c48c64d27e47e5bd0ffd83acbb0d6f573381009aa9cad222ddb731d02a2605f42c15b16c4b7623f