Analysis
-
max time kernel
186s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 19:46
Static task
static1
Behavioral task
behavioral1
Sample
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
Resource
win10v2004-20220812-en
General
-
Target
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe
-
Size
128KB
-
MD5
69e1199ee9c4604d7b3642fb8f1d5840
-
SHA1
4837b2a0cc87fd373825b48ccb1bf6428069c86f
-
SHA256
3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101
-
SHA512
58c0d1cb226143282d0201e75b92797ccd23a6596f92c159df2066ceb29bd3e1e496bb460f537214a53e19ed832a2a9de875807d43fb266460b0f8ba1966ef3e
-
SSDEEP
1536:aNFayQfAgR18TNqY/x0xNS6MD20XMkKoToJJrJJJWr6JrJk53EEt1l+lu9uU7zz6:Nt/kUY5MSxD20XM1orb7t8hbwZOX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1724 svchost.exe 3664 svchost.exe -
resource yara_rule behavioral2/files/0x0008000000022e18-133.dat upx behavioral2/files/0x0008000000022e18-135.dat upx behavioral2/files/0x0008000000022e18-136.dat upx behavioral2/memory/1724-137-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/3664-138-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1724 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 81 PID 4728 wrote to memory of 1724 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 81 PID 4728 wrote to memory of 1724 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 81 PID 4728 wrote to memory of 3664 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 82 PID 4728 wrote to memory of 3664 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 82 PID 4728 wrote to memory of 3664 4728 3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe"C:\Users\Admin\AppData\Local\Temp\3b8eec2745a6060f0c1ac933fe1e9da6ba3aef1fcc91b75e1d2c14e7992b3101.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"C:\Users\Admin\AppData\Local\Temp\001\svchost.exe"2⤵
- Executes dropped EXE
PID:3664
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607
-
Filesize
28KB
MD512f1c087ebf311a01b772513a3fc8837
SHA1012e83a3423113009afccd460b0d8fe8d7914640
SHA2566d8b56a33cf38949bc7d50cc2e7ab390237794c642b4c38b43b193909a40b4bf
SHA5123ad3b3225db7bcc744b22a39288e83f735ff9518aeb60872bbcce3a4889044ab2e770ca9678937ce4580a1f5ca2ddcd22f8910b8e4ece59ea4331d4123782607