Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe
Resource
win10v2004-20220812-en
General
-
Target
85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe
-
Size
95KB
-
MD5
45aa1c9de6086daf7354d7eb8a92f280
-
SHA1
d27938c2c3626ff8c927ea9dd06dddb73755114d
-
SHA256
85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
-
SHA512
07f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
SSDEEP
1536:9xp5dYmUcckwkJSUNUif6Rir0jDW1aSFByrOmoSN6lr/rVqpV5ozBPlvc8OAKLVJ:Lp53ykhJSUd6Rr/WQS3oBoSWr/rVqpb4
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 4876 dl1l.exe 3604 dl1l.exe 1424 dl1l.exe 1632 dl1l.exe 2784 dl1l.exe 360 dl1l.exe 976 dl1l.exe 1904 dl1l.exe 1288 dl1l.exe 1984 dl1l.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe 85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File opened for modification C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe dl1l.exe File created C:\Windows\SysWOW64\dl1l.exe 85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4180 wrote to memory of 4876 4180 85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe 83 PID 4180 wrote to memory of 4876 4180 85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe 83 PID 4180 wrote to memory of 4876 4180 85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe 83 PID 4876 wrote to memory of 3604 4876 dl1l.exe 84 PID 4876 wrote to memory of 3604 4876 dl1l.exe 84 PID 4876 wrote to memory of 3604 4876 dl1l.exe 84 PID 3604 wrote to memory of 1424 3604 dl1l.exe 86 PID 3604 wrote to memory of 1424 3604 dl1l.exe 86 PID 3604 wrote to memory of 1424 3604 dl1l.exe 86 PID 1424 wrote to memory of 1632 1424 dl1l.exe 87 PID 1424 wrote to memory of 1632 1424 dl1l.exe 87 PID 1424 wrote to memory of 1632 1424 dl1l.exe 87 PID 1632 wrote to memory of 2784 1632 dl1l.exe 88 PID 1632 wrote to memory of 2784 1632 dl1l.exe 88 PID 1632 wrote to memory of 2784 1632 dl1l.exe 88 PID 2784 wrote to memory of 360 2784 dl1l.exe 95 PID 2784 wrote to memory of 360 2784 dl1l.exe 95 PID 2784 wrote to memory of 360 2784 dl1l.exe 95 PID 360 wrote to memory of 976 360 dl1l.exe 96 PID 360 wrote to memory of 976 360 dl1l.exe 96 PID 360 wrote to memory of 976 360 dl1l.exe 96 PID 976 wrote to memory of 1904 976 dl1l.exe 97 PID 976 wrote to memory of 1904 976 dl1l.exe 97 PID 976 wrote to memory of 1904 976 dl1l.exe 97 PID 1904 wrote to memory of 1288 1904 dl1l.exe 98 PID 1904 wrote to memory of 1288 1904 dl1l.exe 98 PID 1904 wrote to memory of 1288 1904 dl1l.exe 98 PID 1288 wrote to memory of 1984 1288 dl1l.exe 99 PID 1288 wrote to memory of 1984 1288 dl1l.exe 99 PID 1288 wrote to memory of 1984 1288 dl1l.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe"C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1076 "C:\Users\Admin\AppData\Local\Temp\85ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1152 "C:\Windows\SysWOW64\dl1l.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1124 "C:\Windows\SysWOW64\dl1l.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1128 "C:\Windows\SysWOW64\dl1l.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1132 "C:\Windows\SysWOW64\dl1l.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1140 "C:\Windows\SysWOW64\dl1l.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1136 "C:\Windows\SysWOW64\dl1l.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1144 "C:\Windows\SysWOW64\dl1l.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1148 "C:\Windows\SysWOW64\dl1l.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\dl1l.exeC:\Windows\system32\dl1l.exe 1164 "C:\Windows\SysWOW64\dl1l.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1984
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03
-
Filesize
95KB
MD545aa1c9de6086daf7354d7eb8a92f280
SHA1d27938c2c3626ff8c927ea9dd06dddb73755114d
SHA25685ddc65a6ba2128aa68eab0251bcf72411116fd71d96e0e40e5129b87c06d4f3
SHA51207f8d5e3564eb4cc8d5c0d5849231d5b208f8c914553342ab658f74d303fb5e13e7d343d5af81419adf1b7f01cb650e6cd48e462f606c9d02fc05664cfd40f03