Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe
Resource
win10v2004-20220812-en
General
-
Target
d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe
-
Size
72KB
-
MD5
90e7583fa86fc90cf3466a4925593d30
-
SHA1
07d8196d1c840f12790932e1ee472209ce9274f2
-
SHA256
d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f
-
SHA512
f61fe46690ebd307dfa80db2ada9f8621b0399056fca7d888b3789f01a64f713725d9e4c288b44fef029abda391fc0c8ea4a596a25f93904c51fc4ab6c6b73f9
-
SSDEEP
1536:+NISNxxezlJ62Dp76vRFzUrTgZQoPigVCGcG995sNI:+NTxA8dUrTA77
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1428 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2020 cmd.exe 2020 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1184 wrote to memory of 2020 1184 d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe 28 PID 1184 wrote to memory of 2020 1184 d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe 28 PID 1184 wrote to memory of 2020 1184 d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe 28 PID 1184 wrote to memory of 2020 1184 d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe 28 PID 2020 wrote to memory of 1428 2020 cmd.exe 29 PID 2020 wrote to memory of 1428 2020 cmd.exe 29 PID 2020 wrote to memory of 1428 2020 cmd.exe 29 PID 2020 wrote to memory of 1428 2020 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe"C:\Users\Admin\AppData\Local\Temp\d873b80a6e424032ac868f7bfcf2b7a19a8f8ac131b9f5dda95e8559c292c67f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1428
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD50bfd0843822a4a1a0634ccd5b2d941e2
SHA1eb913274d33e7c4dedaf88786c909bcf98aae997
SHA256a2f747398f6c23814894dccfa00061f2f8e564c763efb0a6f4726ca49ce82aa2
SHA512e1b5022b1e5ab86d5f48598748413a6e140595e446b11eefbfd186059e9a40143825a0625d5202fca240c57bab9731f174a5bfea05a56339352aed3d868699c8
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD50bfd0843822a4a1a0634ccd5b2d941e2
SHA1eb913274d33e7c4dedaf88786c909bcf98aae997
SHA256a2f747398f6c23814894dccfa00061f2f8e564c763efb0a6f4726ca49ce82aa2
SHA512e1b5022b1e5ab86d5f48598748413a6e140595e446b11eefbfd186059e9a40143825a0625d5202fca240c57bab9731f174a5bfea05a56339352aed3d868699c8
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD50bfd0843822a4a1a0634ccd5b2d941e2
SHA1eb913274d33e7c4dedaf88786c909bcf98aae997
SHA256a2f747398f6c23814894dccfa00061f2f8e564c763efb0a6f4726ca49ce82aa2
SHA512e1b5022b1e5ab86d5f48598748413a6e140595e446b11eefbfd186059e9a40143825a0625d5202fca240c57bab9731f174a5bfea05a56339352aed3d868699c8
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD50bfd0843822a4a1a0634ccd5b2d941e2
SHA1eb913274d33e7c4dedaf88786c909bcf98aae997
SHA256a2f747398f6c23814894dccfa00061f2f8e564c763efb0a6f4726ca49ce82aa2
SHA512e1b5022b1e5ab86d5f48598748413a6e140595e446b11eefbfd186059e9a40143825a0625d5202fca240c57bab9731f174a5bfea05a56339352aed3d868699c8