Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe
Resource
win10v2004-20220812-en
General
-
Target
28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe
-
Size
124KB
-
MD5
962cfa90c907494628e4ac54a2e548b4
-
SHA1
537a8d57190fb2ef0e8924f82e15529768b95387
-
SHA256
28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
-
SHA512
a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
SSDEEP
1536:oxojIjwCJXwDEi5r2wjs6tkVjHBYXGKoW:oxosjw8wHLj5AwGKoW
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 956 exp.exe 1308 exp.exe 1116 exp.exe -
Deletes itself 1 IoCs
pid Process 956 exp.exe -
Loads dropped DLL 2 IoCs
pid Process 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\~backup~ = "C:\\Users\\Admin\\Documents\\AppData\\exp.exe" 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\~tempbackup~ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe" 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 exp.exe 956 exp.exe 1308 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 956 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe 1116 exp.exe 956 exp.exe 956 exp.exe 1308 exp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1812 wrote to memory of 956 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe 28 PID 1812 wrote to memory of 956 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe 28 PID 1812 wrote to memory of 956 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe 28 PID 1812 wrote to memory of 956 1812 28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe 28 PID 956 wrote to memory of 1308 956 exp.exe 29 PID 956 wrote to memory of 1308 956 exp.exe 29 PID 956 wrote to memory of 1308 956 exp.exe 29 PID 956 wrote to memory of 1308 956 exp.exe 29 PID 956 wrote to memory of 1116 956 exp.exe 30 PID 956 wrote to memory of 1116 956 exp.exe 30 PID 956 wrote to memory of 1116 956 exp.exe 30 PID 956 wrote to memory of 1116 956 exp.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe"C:\Users\Admin\AppData\Local\Temp\28a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\Documents\AppData\exp.exe"C:\Users\Admin\Documents\AppData\exp.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\Documents\AppData\exp.exeC:\Users\Admin\Documents\AppData\exp.exe -addcopy3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Users\Admin\Documents\AppData\exp.exeC:\Users\Admin\Documents\AppData\exp.exe -addcopy3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD59be207ac5b46d59f78407f67a62aaa79
SHA101fd0f97664779805af0cfb053fbeb3d6d3fbcb3
SHA2561527709a236e4a196194a53678163a1b59687af8aef8470ff22ab6e3e279fb65
SHA51258468cfa552944a59d3b6a137a6fcc4e07d5f977f6769b688a6c15cfbf9abd6e1bf0eee51afccbdcd5a0b4070e387852affb3e4c33aca3f9beba5611f681c589
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e
-
Filesize
124KB
MD5962cfa90c907494628e4ac54a2e548b4
SHA1537a8d57190fb2ef0e8924f82e15529768b95387
SHA25628a02104ab1db0fd63888635afb2dd2636f0604df824f94a9def02fa92cf6d51
SHA512a57de6175c9f84dc4a14cb376e720d8437bc6466ab84f798084852eae35660ef93d3d68c84527ffce0a0368b1d7d29dd23435a99c48fddfe2f80eb481069063e