Analysis
-
max time kernel
77s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 06:56
Static task
static1
Behavioral task
behavioral1
Sample
b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe
Resource
win10v2004-20220812-en
General
-
Target
b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe
-
Size
31KB
-
MD5
6e0a4f1f9140d7887a8ed96da1a1e020
-
SHA1
79639bbc3be26ce8fb9c2b374c0f8e9c7c5ede84
-
SHA256
b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54
-
SHA512
0b7eb67a673e8b1063805b13367f4e12bff5f8c427d37230070e81f9c054be8d8411550b385f2602c0d57df905e62a378e13ea9e91341cac4e6ab75035bb6ce1
-
SSDEEP
768:HFIt7RCKxsoJXNlpy22jVz41IKWvRE7evt7fq:H2hR5KGpy28V45WJdt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1564 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost.exe:exe.exe b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe File created C:\Windows\SysWOW64\icf.exe.exe:exe.exe b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe File opened for modification C:\Windows\SysWOW64\icf.exe.exe:exe.exe b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1052 wrote to memory of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 PID 1052 wrote to memory of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 PID 1052 wrote to memory of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 PID 1052 wrote to memory of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 PID 1052 wrote to memory of 996 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 28 PID 1052 wrote to memory of 1564 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 29 PID 1052 wrote to memory of 1564 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 29 PID 1052 wrote to memory of 1564 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 29 PID 1052 wrote to memory of 1564 1052 b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe"C:\Users\Admin\AppData\Local\Temp\b320ca41faa910225a03c2a502c382dda41a7532c296516480c8663d09d11c54.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2359299.bat2⤵
- Deletes itself
PID:1564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
299B
MD51e854322bcd61247bcc7cdcc941ff5c2
SHA146d9ee7e4aebe282139438def87c777b4fac6924
SHA256fffc4d3b7f03b1e3a9547d11d67a04dd678d4a02a72dd39182fc6375d95c42e8
SHA51240441506d6dc5f5cd3ce8a2894b055ad4c413d7f9a22b17e3d376efc37bc16b46916e3e60b68f00ee07569b5d8fed19fa253adc63b73063ad4f8dd2869cb0b84