Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
22/09/2022, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe
Resource
win10v2004-20220812-en
General
-
Target
ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe
-
Size
15.2MB
-
MD5
c6305a70a7507d580df16a25cc6d0933
-
SHA1
7f91267ad3ecf684d36a1d9a25287804e28cfac9
-
SHA256
ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936
-
SHA512
4d8160cdeeedf26fa1a900e39abf4286c30725a63b20074f27c469b0a518e0dd4e5a751dcf95f5afff150b78e29a41bc9009c2e56749fb0d5a5a659fbe11bb87
-
SSDEEP
393216:UM6grn9+BjqoffR71aTtMQ7SyCRjwxxuD:URffR5Qp7rCRjCuD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1080 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp -
Loads dropped DLL 1 IoCs
pid Process 1292 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1080 1292 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe 27 PID 1292 wrote to memory of 1080 1292 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe 27 PID 1292 wrote to memory of 1080 1292 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe 27 PID 1292 wrote to memory of 1080 1292 ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe"C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp"C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp" /SL5="$80022,15638478,58368,C:\Users\Admin\AppData\Local\Temp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.exe"2⤵
- Executes dropped EXE
PID:1080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp
Filesize706KB
MD5ee588c43b0ed7b2d0fd91488a594a0da
SHA1db349399e16e13a936f1ab40c4fce3520594b98f
SHA256fbe9685a3ec433a184d139ce98369d8eb7ede0f88ed8ba0e0fdb96330b76a0b5
SHA51242b988e05209b07c182a82d7a98ba877e89195d50ec649f20d24090b490d08a2c922149c193826f862b370fbe75c6e66b2fe1d34414edf9105e3a7f7a1b281dc
-
\Users\Admin\AppData\Local\Temp\is-7LFH9.tmp\ed96c9aa041efa03925f685f45e4512ac675e6caa2a50ad39eb783a7fa2ad936.tmp
Filesize706KB
MD5ee588c43b0ed7b2d0fd91488a594a0da
SHA1db349399e16e13a936f1ab40c4fce3520594b98f
SHA256fbe9685a3ec433a184d139ce98369d8eb7ede0f88ed8ba0e0fdb96330b76a0b5
SHA51242b988e05209b07c182a82d7a98ba877e89195d50ec649f20d24090b490d08a2c922149c193826f862b370fbe75c6e66b2fe1d34414edf9105e3a7f7a1b281dc