Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe
Resource
win10v2004-20220812-en
General
-
Target
7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe
-
Size
301KB
-
MD5
61bb8b121f44b62f5a4e863ff6ceb0f0
-
SHA1
ef227419dc821485a22836576d4e0fae62d6490c
-
SHA256
7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164
-
SHA512
38bcf7e9f99221c49ac52351cab471b495eeb9f6e656b8a927e8c49de2636282e6dcadaab75bf49a354439a98a117d438d6a0f0073dcb05dd23ea1da31824103
-
SSDEEP
6144:g78nTpnyRPYZWG5U5X5WqoAY7O3Q9KL8W7p7bo:28nkQEG254qFgOgoLxp7bo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1148 reqe.exe -
Deletes itself 1 IoCs
pid Process 1556 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reqe.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\{CB118568-7F59-AD4D-CD9C-5E5DE9C17D40} = "C:\\Users\\Admin\\AppData\\Roaming\\Emac\\reqe.exe" reqe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe 1148 reqe.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1148 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 27 PID 1408 wrote to memory of 1148 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 27 PID 1408 wrote to memory of 1148 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 27 PID 1408 wrote to memory of 1148 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 27 PID 1148 wrote to memory of 1200 1148 reqe.exe 17 PID 1148 wrote to memory of 1200 1148 reqe.exe 17 PID 1148 wrote to memory of 1200 1148 reqe.exe 17 PID 1148 wrote to memory of 1200 1148 reqe.exe 17 PID 1148 wrote to memory of 1200 1148 reqe.exe 17 PID 1148 wrote to memory of 1308 1148 reqe.exe 10 PID 1148 wrote to memory of 1308 1148 reqe.exe 10 PID 1148 wrote to memory of 1308 1148 reqe.exe 10 PID 1148 wrote to memory of 1308 1148 reqe.exe 10 PID 1148 wrote to memory of 1308 1148 reqe.exe 10 PID 1148 wrote to memory of 1348 1148 reqe.exe 16 PID 1148 wrote to memory of 1348 1148 reqe.exe 16 PID 1148 wrote to memory of 1348 1148 reqe.exe 16 PID 1148 wrote to memory of 1348 1148 reqe.exe 16 PID 1148 wrote to memory of 1348 1148 reqe.exe 16 PID 1148 wrote to memory of 1408 1148 reqe.exe 26 PID 1148 wrote to memory of 1408 1148 reqe.exe 26 PID 1148 wrote to memory of 1408 1148 reqe.exe 26 PID 1148 wrote to memory of 1408 1148 reqe.exe 26 PID 1148 wrote to memory of 1408 1148 reqe.exe 26 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28 PID 1408 wrote to memory of 1556 1408 7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe 28
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1308
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe"C:\Users\Admin\AppData\Local\Temp\7e0635764b5780aedcb4126c661e4859f61a0e2a64c9dc5d8db00c94fa02f164.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Roaming\Emac\reqe.exe"C:\Users\Admin\AppData\Roaming\Emac\reqe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf1453693.bat"3⤵
- Deletes itself
PID:1556
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307B
MD57f189a649fde476f2f75bee22ef41d5b
SHA11aa94986173749add8351a9112e5ae8bf5d4ee46
SHA2563b0d507df960b60e30ad7ddbfa863ef6f1f7a97994d38aba6598f53d1e02edef
SHA512e5213bd8c99f662c91c5c75ad7ddc7eb99371df1f0e408a58b9d80295d04510a11879b55a1f581f20a7cb43a9ebfb1132be0f0f83357adf6342b81c6aaeecd4a
-
Filesize
301KB
MD5a4bbb0c2f1a880df41528d88efa67299
SHA13513cbaf01a217d05332491685f123d0fbe98020
SHA2566d4390bb2694f7b9d9de775ea9322b82963e3b3e63214e55b213cd857874c415
SHA512a6af689ec16e1ed1492bbf68b4ca39cd3bd68ad310137c696916319b16d8bfff53c8041671b3494e25742796bcc1002ea4b0e2056fef6f53d49b9f60281f3493
-
Filesize
301KB
MD5a4bbb0c2f1a880df41528d88efa67299
SHA13513cbaf01a217d05332491685f123d0fbe98020
SHA2566d4390bb2694f7b9d9de775ea9322b82963e3b3e63214e55b213cd857874c415
SHA512a6af689ec16e1ed1492bbf68b4ca39cd3bd68ad310137c696916319b16d8bfff53c8041671b3494e25742796bcc1002ea4b0e2056fef6f53d49b9f60281f3493
-
Filesize
301KB
MD5a4bbb0c2f1a880df41528d88efa67299
SHA13513cbaf01a217d05332491685f123d0fbe98020
SHA2566d4390bb2694f7b9d9de775ea9322b82963e3b3e63214e55b213cd857874c415
SHA512a6af689ec16e1ed1492bbf68b4ca39cd3bd68ad310137c696916319b16d8bfff53c8041671b3494e25742796bcc1002ea4b0e2056fef6f53d49b9f60281f3493
-
Filesize
301KB
MD5a4bbb0c2f1a880df41528d88efa67299
SHA13513cbaf01a217d05332491685f123d0fbe98020
SHA2566d4390bb2694f7b9d9de775ea9322b82963e3b3e63214e55b213cd857874c415
SHA512a6af689ec16e1ed1492bbf68b4ca39cd3bd68ad310137c696916319b16d8bfff53c8041671b3494e25742796bcc1002ea4b0e2056fef6f53d49b9f60281f3493