Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 17:10
Static task
static1
Behavioral task
behavioral1
Sample
8c8ccd62ff67de6d08c2bd333fed74eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c8ccd62ff67de6d08c2bd333fed74eb.exe
Resource
win10v2004-20220901-en
General
-
Target
8c8ccd62ff67de6d08c2bd333fed74eb.exe
-
Size
303KB
-
MD5
8c8ccd62ff67de6d08c2bd333fed74eb
-
SHA1
a777654fbae0dbf08221974bc735049816fad27a
-
SHA256
89730a01713e719ee2d3ad156cfc629b8a7bb6389149d01b7a10b30f9b49338d
-
SHA512
2a38be61ee32265a8ea3b9b1908b03788394d4d653706ed0565abe2330a59827f5452ace0490a8796d738c183cd47dbd1e06fa0f80a0ca5e9947b5921f747952
-
SSDEEP
6144:ByH7xOc6H5c6HcT66vlm6o26jNYfXVYRa:BaR1dYU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1832 svchost.exe 1144 8c8ccd62ff67de6d08c2bd333fed74eb.exe 1232 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 svchost.exe 1832 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 8c8ccd62ff67de6d08c2bd333fed74eb.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1832 1100 8c8ccd62ff67de6d08c2bd333fed74eb.exe 28 PID 1100 wrote to memory of 1832 1100 8c8ccd62ff67de6d08c2bd333fed74eb.exe 28 PID 1100 wrote to memory of 1832 1100 8c8ccd62ff67de6d08c2bd333fed74eb.exe 28 PID 1100 wrote to memory of 1832 1100 8c8ccd62ff67de6d08c2bd333fed74eb.exe 28 PID 1832 wrote to memory of 1144 1832 svchost.exe 29 PID 1832 wrote to memory of 1144 1832 svchost.exe 29 PID 1832 wrote to memory of 1144 1832 svchost.exe 29 PID 1832 wrote to memory of 1144 1832 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c8ccd62ff67de6d08c2bd333fed74eb.exe"C:\Users\Admin\AppData\Local\Temp\8c8ccd62ff67de6d08c2bd333fed74eb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\8c8ccd62ff67de6d08c2bd333fed74eb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\8c8ccd62ff67de6d08c2bd333fed74eb.exe"C:\Users\Admin\AppData\Local\Temp\8c8ccd62ff67de6d08c2bd333fed74eb.exe"3⤵
- Executes dropped EXE
PID:1144
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:1232
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD50b20c730ea2b416d3ff66b83a0fb282d
SHA16ec31f464fbce17bed367bd9edc667d16dcd3ba2
SHA2566ef39ecbd0b1b54359691a49535c75ff56f6388809809672703feb9a61de1b84
SHA51214b9defad737d5209a146bce9226bba57e602da67f1eb1d4c97030776da8119120e53080b298b76c5d7ad66e79e59a3554ef52b2eae910b97fbd91e3c8c91095
-
Filesize
35KB
MD513e083a9d53e948803694a603e69081a
SHA15f0926b43c970edad8b969cbec9cfebb5ad0a971
SHA256305485ffc5c72617b5b4d6af8a69bc77574c05df4b21829e08bb3a6a2ffd16c5
SHA512a2b4073ba2edafae7f276c2fb1279dd19f2be6dbe67ed1c9f94a082afca70286493b9c33e1fb705d7e1bab3fe66afc84173e9490751611b5c628970892d08814
-
Filesize
35KB
MD513e083a9d53e948803694a603e69081a
SHA15f0926b43c970edad8b969cbec9cfebb5ad0a971
SHA256305485ffc5c72617b5b4d6af8a69bc77574c05df4b21829e08bb3a6a2ffd16c5
SHA512a2b4073ba2edafae7f276c2fb1279dd19f2be6dbe67ed1c9f94a082afca70286493b9c33e1fb705d7e1bab3fe66afc84173e9490751611b5c628970892d08814
-
Filesize
35KB
MD513e083a9d53e948803694a603e69081a
SHA15f0926b43c970edad8b969cbec9cfebb5ad0a971
SHA256305485ffc5c72617b5b4d6af8a69bc77574c05df4b21829e08bb3a6a2ffd16c5
SHA512a2b4073ba2edafae7f276c2fb1279dd19f2be6dbe67ed1c9f94a082afca70286493b9c33e1fb705d7e1bab3fe66afc84173e9490751611b5c628970892d08814
-
Filesize
268KB
MD50b20c730ea2b416d3ff66b83a0fb282d
SHA16ec31f464fbce17bed367bd9edc667d16dcd3ba2
SHA2566ef39ecbd0b1b54359691a49535c75ff56f6388809809672703feb9a61de1b84
SHA51214b9defad737d5209a146bce9226bba57e602da67f1eb1d4c97030776da8119120e53080b298b76c5d7ad66e79e59a3554ef52b2eae910b97fbd91e3c8c91095
-
Filesize
268KB
MD50b20c730ea2b416d3ff66b83a0fb282d
SHA16ec31f464fbce17bed367bd9edc667d16dcd3ba2
SHA2566ef39ecbd0b1b54359691a49535c75ff56f6388809809672703feb9a61de1b84
SHA51214b9defad737d5209a146bce9226bba57e602da67f1eb1d4c97030776da8119120e53080b298b76c5d7ad66e79e59a3554ef52b2eae910b97fbd91e3c8c91095