Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 16:00
Static task
static1
Behavioral task
behavioral1
Sample
3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe
Resource
win10v2004-20220901-en
General
-
Target
3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe
-
Size
1.9MB
-
MD5
c18eedf717d2241791d0d6d198108c3a
-
SHA1
11cca93f01133aac7ad9d0d8b0d11d600738681d
-
SHA256
3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7
-
SHA512
73e166ce56d03c4d80af33ea516690d7e6020c75a43cf742f9d8cf3e5ebae392b2b8924fc80de888fffc54bfef3a31c104ccca16510aadc21334ad2138ce2713
-
SSDEEP
24576:t7FUDowAyrTVE3U5FmMtjqHMQs3JIwaVzE5x7awFhJdNo69lOy7KTijlz:tBuZrEUWsb3ipE55DdN7POGjh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1624 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp -
Loads dropped DLL 2 IoCs
pid Process 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 1624 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27 PID 1672 wrote to memory of 1624 1672 3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe"C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp"C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp" /SL5="$70124,1123903,832512,C:\Users\Admin\AppData\Local\Temp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp
Filesize3.0MB
MD56b4b3a771b70a471d8b0cd318b9298e9
SHA147eb8bf55d56ee221e56c00b8fdfc1a6ddc95f6f
SHA256c23aa1780d81d16cfa9caaf60cf0b12a2b0772f3c9ced5c22b415eb62ee232fa
SHA512f8c327c3f0b9c6351b7e22627053f493f728c96a15f6d50d9597913e21c03a4a937312dca6b06a24b909deb92e3f9986997628db84b825d6c940deeab8f58d5c
-
Filesize
419KB
MD57acd12c152179c868c825aada166e40a
SHA16e3f2392b9296c79698434dadf6cfd5395aa8ba7
SHA25634f43b1fd5bf852de7071540eb0768fce1d7e45a90d3ac18d2ebe99aacb1a940
SHA51203b592c1f4f1d5175680e9ed4ddc8cf5bd53a56fad33d887425a95c9fb3670c7d075df59903e7d1ca5686a60a7acb3b7237c8fc815105b853e62bdca367dec2c
-
\Users\Admin\AppData\Local\Temp\is-MUCBQ.tmp\3e7f79a7f07a8a58de86ad381c5a1a535c21f956138639a08db44324407b67d7.tmp
Filesize3.0MB
MD56b4b3a771b70a471d8b0cd318b9298e9
SHA147eb8bf55d56ee221e56c00b8fdfc1a6ddc95f6f
SHA256c23aa1780d81d16cfa9caaf60cf0b12a2b0772f3c9ced5c22b415eb62ee232fa
SHA512f8c327c3f0b9c6351b7e22627053f493f728c96a15f6d50d9597913e21c03a4a937312dca6b06a24b909deb92e3f9986997628db84b825d6c940deeab8f58d5c