Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-10-2022 15:10
Static task
static1
Behavioral task
behavioral1
Sample
4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe
Resource
win10v2004-20220901-en
General
-
Target
4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe
-
Size
594KB
-
MD5
74cbaf5134ee6cabada5aa172b426770
-
SHA1
1746bff98f323cc3907912b44422712b100e80fa
-
SHA256
4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211
-
SHA512
38a44fa04ce411857abc8e87b368d32a4c0796c7d05cd8424eefb0806c280823858cf19364c62b276482e6e496abd47df49b404d24539a190c52c77186ad9a62
-
SSDEEP
12288:mX2/U+GngI3xU5eo2BkcNf618kJiRvhbFTqqWF7tQ2Ta4Sw:U28lJxU5eomRNf6BJiPFGq6y2Ta4/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1368 shtep.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\90ucw\shtep.exe 4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe File opened for modification C:\Program Files (x86)\90ucw\shtep.exe 4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe File opened for modification C:\Program Files (x86)\90ucw\shtep.exe shtep.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1388 1368 shtep.exe 27 PID 1368 wrote to memory of 1388 1368 shtep.exe 27 PID 1368 wrote to memory of 1388 1368 shtep.exe 27 PID 1368 wrote to memory of 1388 1368 shtep.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe"C:\Users\Admin\AppData\Local\Temp\4d47905c0ddb8fb8b555e137e922fc6a2c940dc6ed639182f99f04587f25e211.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
C:\Program Files (x86)\90ucw\shtep.exe"C:\Program Files (x86)\90ucw\shtep.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXEC:\Program Files (x86)\90ucw\shtep.exe2⤵PID:1388
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21.6MB
MD55979d2e144aad1824dd90ea5f018e8c6
SHA1101187eac1a037ab1365cd1c9ef71c4449fca4d2
SHA25651c77be5492d06337f9d1079030d24ed5f99879daee187fa32726c10c1d67288
SHA512d899edc73ffc978a4d5d553ab567acc2f76575a4d3be0dd5b37b9404b9172d3dae29037200f79c81369f6f97253a82178115e8d538ace16901b77f605b6e7092
-
Filesize
21.6MB
MD55979d2e144aad1824dd90ea5f018e8c6
SHA1101187eac1a037ab1365cd1c9ef71c4449fca4d2
SHA25651c77be5492d06337f9d1079030d24ed5f99879daee187fa32726c10c1d67288
SHA512d899edc73ffc978a4d5d553ab567acc2f76575a4d3be0dd5b37b9404b9172d3dae29037200f79c81369f6f97253a82178115e8d538ace16901b77f605b6e7092