Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 14:49
Behavioral task
behavioral1
Sample
864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe
Resource
win10v2004-20220812-en
General
-
Target
864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe
-
Size
150KB
-
MD5
7af62f59078c25fc83a0101cf619deed
-
SHA1
5d022bde86071f48f0fd3017474a8752de4de466
-
SHA256
864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3
-
SHA512
2a1ae7b967bef33cf843ce5b715701a80295add5295c9c94f72c7166e4b987f29b438dae6b40da448d99f1ab6a4a89001a35fb3fbc77bedfc9d57d98df93ddb3
-
SSDEEP
3072:wDCuZBe4kQZbXQRH2mlj7ud7s01Dx+pjH9F5:wDCL45Zb2WW6dY0Jx+ZX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1696 apocalyps32.exe -
resource yara_rule behavioral1/files/0x000a000000005c51-56.dat upx behavioral1/memory/1352-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000a000000005c51-59.dat upx behavioral1/memory/1696-61-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral1/memory/1696-64-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe File opened for modification C:\Windows\apocalyps32.exe 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe File created C:\Windows\apocalyps32.exe apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1696 1352 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe 26 PID 1352 wrote to memory of 1696 1352 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe 26 PID 1352 wrote to memory of 1696 1352 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe 26 PID 1352 wrote to memory of 1696 1352 864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe 26 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27 PID 1696 wrote to memory of 1684 1696 apocalyps32.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe"C:\Users\Admin\AppData\Local\Temp\864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\apocalyps32.exe-bs2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1684
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD57af62f59078c25fc83a0101cf619deed
SHA15d022bde86071f48f0fd3017474a8752de4de466
SHA256864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3
SHA5122a1ae7b967bef33cf843ce5b715701a80295add5295c9c94f72c7166e4b987f29b438dae6b40da448d99f1ab6a4a89001a35fb3fbc77bedfc9d57d98df93ddb3
-
Filesize
150KB
MD57af62f59078c25fc83a0101cf619deed
SHA15d022bde86071f48f0fd3017474a8752de4de466
SHA256864a654f9f4cf1b123a71a7319b4cf3189977b5745d0d1f72796bca80b9b99f3
SHA5122a1ae7b967bef33cf843ce5b715701a80295add5295c9c94f72c7166e4b987f29b438dae6b40da448d99f1ab6a4a89001a35fb3fbc77bedfc9d57d98df93ddb3