Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 19:46
Static task
static1
Behavioral task
behavioral1
Sample
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
Resource
win10v2004-20220812-en
General
-
Target
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
-
Size
128KB
-
MD5
69e1199ee9c4604d7b3642fb8f1d5840
-
SHA1
4837b2a0cc87fd373825b48ccb1bf6428069c86f
-
SHA256
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101
-
SHA512
58c0d1cb226143282d0201e75b92797ccd23a6596f92c159df2066ceb29bd3e1e496bb460f537214a53e19ed832a2a9de875807d43fb266460b0f8ba1966ef3e
-
SSDEEP
1536:aNFayQfAgR18TNqY/x0xNS6MD20XMkKoToJJrJJJWr6JrJk53EEt1l+lu9uU7zz6:Nt/kUY5MSxD20XM1orb7t8hbwZOX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 svchost.exe -
resource yara_rule behavioral1/files/0x0008000000014544-54.dat upx behavioral1/files/0x0008000000014544-55.dat upx behavioral1/files/0x0008000000014544-57.dat upx behavioral1/memory/1872-58-0x00000000003B0000-0x00000000003C3000-memory.dmp upx behavioral1/memory/1992-60-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1992-62-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1992 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 27 PID 1872 wrote to memory of 1992 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 27 PID 1872 wrote to memory of 1992 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 27 PID 1872 wrote to memory of 1992 1872 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe"C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"2⤵
- Executes dropped EXE
PID:1992
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607