Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe
Resource
win10v2004-20220901-en
General
-
Target
e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe
-
Size
315KB
-
MD5
f65d038c7060b57405df3029f7642321
-
SHA1
371c87ffc232cbd2258cd801634c284dfb50eb67
-
SHA256
e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074
-
SHA512
b6dfe0d0d0de2f674b5b11f5178f0b159c0b7c064d98b6f95264138d2c9cd1e77fdffa986c81c4dde78830e48428c970fedd375615779419e627c8a344ba7d9a
-
SSDEEP
6144:dnMfIq+XLROUxHXGmUReIyZyCcgHuVzOaO+tZGu:dMgZXNOUBXXRTOAz+Gu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1620 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe.back -
Loads dropped DLL 1 IoCs
pid Process 364 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 1620 364 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe 26 PID 364 wrote to memory of 1620 364 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe 26 PID 364 wrote to memory of 1620 364 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe 26 PID 364 wrote to memory of 1620 364 e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe"C:\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe.back"C:\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe.back"2⤵
- Executes dropped EXE
PID:1620
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe.back
Filesize315KB
MD53f07dcf7818d15dc936b2e3551b4836a
SHA1ae07bf61de468db65ef70fef92f0e7ddefcb34e0
SHA256234ccc6d22ab1f3ed06c41f6233d35189e6378a871fe1fa712b9fb3ecf2db46c
SHA512e25d22bdae7c1b8eeec7ed70fe75c2c340ad99e7e3c6a10503f6b6faba5c9e6dd551092077dfab73019ba42f8159e3715f49d3cd75461b37a09437a060d48758
-
\Users\Admin\AppData\Local\Temp\e2e59503c5330459661cd87007b06885f0c326eb378d9a207b591e6c1ab63074.exe.back
Filesize315KB
MD53f07dcf7818d15dc936b2e3551b4836a
SHA1ae07bf61de468db65ef70fef92f0e7ddefcb34e0
SHA256234ccc6d22ab1f3ed06c41f6233d35189e6378a871fe1fa712b9fb3ecf2db46c
SHA512e25d22bdae7c1b8eeec7ed70fe75c2c340ad99e7e3c6a10503f6b6faba5c9e6dd551092077dfab73019ba42f8159e3715f49d3cd75461b37a09437a060d48758