Analysis
-
max time kernel
89s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe
Resource
win10v2004-20220812-en
General
-
Target
ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe
-
Size
51KB
-
MD5
00c4038ee6f560b59d8682069742e4cd
-
SHA1
fbef0d1ac7cad7fba3a44994247a48e6bca7bbc8
-
SHA256
ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c
-
SHA512
b745b116a9a0791d26e763e3c6f03c779a723c4bd2cac4c878409a17356478cc2a3e6283b1022c1f75907654c4af880484ab39bb9899296b780df2ccc045bc10
-
SSDEEP
768:PsTdTBq6EYj87aNUpHZGXVEbOB8UHsn8Z/1iJBn/Iiy8FKogdwc:UtEYjIaNUR8EbOquZZ/1E/IiDKoK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1536 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\kr_done1 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1896 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1536 1896 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe 30 PID 1896 wrote to memory of 1536 1896 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe 30 PID 1896 wrote to memory of 1536 1896 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe 30 PID 1896 wrote to memory of 1536 1896 ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe"C:\Users\Admin\AppData\Local\Temp\ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\uninst06d710c.bat" "C:\Users\Admin\AppData\Local\Temp\ca91e16da08cdfd9febdade619f99a4ff0b3d3b95779f3b3ca82fa459117964c.exe""2⤵
- Deletes itself
PID:1536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59B
MD52988b921fbed03f9c93c5d538932bbe3
SHA14b791b3d59ae76ff091c2cf201b40f5d1b432a3f
SHA256a1769979622d3d25829be12474ad32ccfdfcac59785dac2fc10ae49c300e4ea3
SHA5122920c6e9851973371dc238da1ee3c63d41c7820637856ee92c67e9489c1790e3fad287d229440d124e60b978f6819d04b47c40de9034cbd9de422aaafc2b07f9