Analysis
-
max time kernel
28s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
Resource
win10v2004-20220812-en
General
-
Target
86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
-
Size
652KB
-
MD5
26682fe225e59f0f6743612217f60348
-
SHA1
cd185c171bb0ade8e03fbb21f4c88c7781af155c
-
SHA256
86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c
-
SHA512
00969a3138c7a8ada1a2e61a69902276e7242810b20aa35f050e80067236b28acfd406d053e4450545e26928feebbea1b1ea52e2e33c516da772d7d274232d73
-
SSDEEP
12288:AamQI+11WIfAFuFLHBPnzJtMjqnCHBoYXNrSi6fI7XHgZQKhJgeCmfbYna:Aa7I+SIL5zJtMjqnYrSirLHgZpJEFa
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 592 svchost.exe 1012 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe 1328 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 592 svchost.exe 592 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1888 wrote to memory of 592 1888 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe 27 PID 1888 wrote to memory of 592 1888 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe 27 PID 1888 wrote to memory of 592 1888 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe 27 PID 1888 wrote to memory of 592 1888 86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe 27 PID 592 wrote to memory of 1012 592 svchost.exe 28 PID 592 wrote to memory of 1012 592 svchost.exe 28 PID 592 wrote to memory of 1012 592 svchost.exe 28 PID 592 wrote to memory of 1012 592 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe"C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe"C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe"3⤵
- Executes dropped EXE
PID:1012
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:1328
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
Filesize616KB
MD578453c62ec9ea61524f4a3b0877731e3
SHA12ed9061327dee6a296e6ca9cb386094ecbe46c67
SHA25677bf8de897e8b839928bf592d28ce80297b227050c4b0138ff43e4d646c2c0ff
SHA5127299402b1fa1f421f2c66e99588bca1b6fda471decaccc0e530ca44f9012142e896262df0eec0c78d0f41bb4a8a65ee2f7a936004f9625950f9f16f9f5c9dd5e
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
Filesize616KB
MD578453c62ec9ea61524f4a3b0877731e3
SHA12ed9061327dee6a296e6ca9cb386094ecbe46c67
SHA25677bf8de897e8b839928bf592d28ce80297b227050c4b0138ff43e4d646c2c0ff
SHA5127299402b1fa1f421f2c66e99588bca1b6fda471decaccc0e530ca44f9012142e896262df0eec0c78d0f41bb4a8a65ee2f7a936004f9625950f9f16f9f5c9dd5e
-
\Users\Admin\AppData\Local\Temp\86a804e2b7002b2f2dd5778e112abc75c16779b074bf795db31229adef6b923c.exe
Filesize616KB
MD578453c62ec9ea61524f4a3b0877731e3
SHA12ed9061327dee6a296e6ca9cb386094ecbe46c67
SHA25677bf8de897e8b839928bf592d28ce80297b227050c4b0138ff43e4d646c2c0ff
SHA5127299402b1fa1f421f2c66e99588bca1b6fda471decaccc0e530ca44f9012142e896262df0eec0c78d0f41bb4a8a65ee2f7a936004f9625950f9f16f9f5c9dd5e