Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe
Resource
win10v2004-20220812-en
General
-
Target
0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe
-
Size
366KB
-
MD5
964d4d3b9ea4341fb0841888f24e3190
-
SHA1
19d2b3b26762c2d526665e13444de60e550c5308
-
SHA256
0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
-
SHA512
8ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
SSDEEP
3072:0Wg5zU4L9GzqdH9UhBto3orkH8agZ0jUA:0RTLsoU7y3hH8kB
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 532 mswin32.pif 3532 mswin32.pif 3664 mswin32.pif 3980 mswin32.pif 2984 mswin32.pif 4856 mswin32.pif 4452 mswin32.pif -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif 0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif 0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File created C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif File opened for modification C:\Windows\SysWOW64\mswin32.pif mswin32.pif -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 504 wrote to memory of 532 504 0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe 84 PID 504 wrote to memory of 532 504 0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe 84 PID 504 wrote to memory of 532 504 0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe 84 PID 532 wrote to memory of 3532 532 mswin32.pif 87 PID 532 wrote to memory of 3532 532 mswin32.pif 87 PID 532 wrote to memory of 3532 532 mswin32.pif 87 PID 3532 wrote to memory of 3664 3532 mswin32.pif 88 PID 3532 wrote to memory of 3664 3532 mswin32.pif 88 PID 3532 wrote to memory of 3664 3532 mswin32.pif 88 PID 3664 wrote to memory of 3980 3664 mswin32.pif 90 PID 3664 wrote to memory of 3980 3664 mswin32.pif 90 PID 3664 wrote to memory of 3980 3664 mswin32.pif 90 PID 3980 wrote to memory of 2984 3980 mswin32.pif 94 PID 3980 wrote to memory of 2984 3980 mswin32.pif 94 PID 3980 wrote to memory of 2984 3980 mswin32.pif 94 PID 2984 wrote to memory of 4856 2984 mswin32.pif 95 PID 2984 wrote to memory of 4856 2984 mswin32.pif 95 PID 2984 wrote to memory of 4856 2984 mswin32.pif 95 PID 4856 wrote to memory of 4452 4856 mswin32.pif 96 PID 4856 wrote to memory of 4452 4856 mswin32.pif 96 PID 4856 wrote to memory of 4452 4856 mswin32.pif 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe"C:\Users\Admin\AppData\Local\Temp\0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1124 "C:\Users\Admin\AppData\Local\Temp\0451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1132 "C:\Windows\SysWOW64\mswin32.pif"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1096 "C:\Windows\SysWOW64\mswin32.pif"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1092 "C:\Windows\SysWOW64\mswin32.pif"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1100 "C:\Windows\SysWOW64\mswin32.pif"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1104 "C:\Windows\SysWOW64\mswin32.pif"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\mswin32.pifC:\Windows\system32\mswin32.pif 1112 "C:\Windows\SysWOW64\mswin32.pif"8⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4452
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c
-
Filesize
366KB
MD5964d4d3b9ea4341fb0841888f24e3190
SHA119d2b3b26762c2d526665e13444de60e550c5308
SHA2560451d660235cd6ab82c6034771b991f345a9c027046d0d6c98bb06edcda7c99b
SHA5128ba4e51f1af7d24d3264286f012e9a6adf03e5ba0f4f8a414cfa7de546f0b06ef2f7f4c9313185c848a3d58ff95d90bd5f53e7153b0f08cb655d596bcd53447c