Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/09/2022, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
f0f245e4d845dc70162125e3cdee47d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0f245e4d845dc70162125e3cdee47d3.exe
Resource
win10v2004-20220812-en
General
-
Target
f0f245e4d845dc70162125e3cdee47d3.exe
-
Size
2.0MB
-
MD5
f0f245e4d845dc70162125e3cdee47d3
-
SHA1
ed18d4003721cc216c2009f7354c81d55d4c5619
-
SHA256
72a54d59bdc50b9fa821b91f617258f844c1f014cfe169ca1f1f3769d9340df7
-
SHA512
906c2053993f428cfc5a97263f201c1d195fbf322a0ca22cd24abb2e8bfa08f22a5f4703d018f7ab0ee5ed0ae6a0aa44a00d75abb24b1be169211758336b7bee
-
SSDEEP
24576:l7FUDowAyrTVE3U5FmcpExU1S+x25J7o59Sc/5x7awFhJdNo69lOy7KTijli:lBuZrEUEoyc/55DdN7POGj8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1824 f0f245e4d845dc70162125e3cdee47d3.tmp -
Loads dropped DLL 2 IoCs
pid Process 1760 f0f245e4d845dc70162125e3cdee47d3.exe 1824 f0f245e4d845dc70162125e3cdee47d3.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28 PID 1760 wrote to memory of 1824 1760 f0f245e4d845dc70162125e3cdee47d3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0f245e4d845dc70162125e3cdee47d3.exe"C:\Users\Admin\AppData\Local\Temp\f0f245e4d845dc70162125e3cdee47d3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\is-OQBFN.tmp\f0f245e4d845dc70162125e3cdee47d3.tmp"C:\Users\Admin\AppData\Local\Temp\is-OQBFN.tmp\f0f245e4d845dc70162125e3cdee47d3.tmp" /SL5="$90124,1201179,832512,C:\Users\Admin\AppData\Local\Temp\f0f245e4d845dc70162125e3cdee47d3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD57118bcb92b75d8a6407f0c953bc5e704
SHA187e4c6727af561b331dda6a8c643a389ff8a8967
SHA25678bb03c3f0ce9fa4889ecd5f20b72b2a2f12b326815bba9ce7802d8f3c202bba
SHA51249dd5f626d8f14af6b96ac65d66081f145b33f8fcd8e5f98f939be5b21a5d73b4516a952cab132b83f63664bdca2f7be2b5c0613034d01bae0bd142db2ae5efe
-
Filesize
373KB
MD5c708050b3e483c1ed21d708a1f73af0c
SHA1d4f20b411202da536cf217e442236d3239c9302d
SHA256a7a80a6f1f7bb19eba9392799852dba58f16461b98662b13370919c32d4fc2d4
SHA512d12133776afc185e0779dd76f52cd30826c6e667108c49ba6bb48129c68c1145066c46caf4fb31aaee6d3cab3174409281d6926b3f9ded3f6d8f7c755d426a51
-
Filesize
3.0MB
MD57118bcb92b75d8a6407f0c953bc5e704
SHA187e4c6727af561b331dda6a8c643a389ff8a8967
SHA25678bb03c3f0ce9fa4889ecd5f20b72b2a2f12b326815bba9ce7802d8f3c202bba
SHA51249dd5f626d8f14af6b96ac65d66081f145b33f8fcd8e5f98f939be5b21a5d73b4516a952cab132b83f63664bdca2f7be2b5c0613034d01bae0bd142db2ae5efe