Analysis
-
max time kernel
160s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe
Resource
win10v2004-20220812-en
General
-
Target
3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe
-
Size
455KB
-
MD5
539582ee3ef7f268af30fb49ec3b78c0
-
SHA1
811a31664a5b99bcff55f3be402ad22815aa5c17
-
SHA256
3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1
-
SHA512
c69667be93445858b438cd19cc7a79351f6d56e577b7e2086613ea19a917e9ed527ea031aa495b9d4bcab0a20b8749c06763e267af7b702589663d88c7757421
-
SSDEEP
6144:Egbvegtf49L/EgHSkY0V+27/u7+5wUgSCkTc39Iz:dW9L/E4xYZJSm3Cz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1860 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 928 set thread context of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 set thread context of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 928 wrote to memory of 4724 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 81 PID 928 wrote to memory of 4724 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 81 PID 928 wrote to memory of 4724 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 81 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 4696 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 82 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 928 wrote to memory of 1860 928 3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe 84 PID 4724 wrote to memory of 1248 4724 cmd.exe 86 PID 4724 wrote to memory of 1248 4724 cmd.exe 86 PID 4724 wrote to memory of 1248 4724 cmd.exe 86 PID 1248 wrote to memory of 956 1248 net.exe 88 PID 1248 wrote to memory of 956 1248 net.exe 88 PID 1248 wrote to memory of 956 1248 net.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe"C:\Users\Admin\AppData\Local\Temp\3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:956
-
-
-
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"2⤵PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exeC:\Users\Admin\AppData\Local\Temp\3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe2⤵
- Executes dropped EXE
PID:1860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1.exe
Filesize455KB
MD5539582ee3ef7f268af30fb49ec3b78c0
SHA1811a31664a5b99bcff55f3be402ad22815aa5c17
SHA2563218dc5e3a5ab6ce361e7e5e2cc8bed2743e665c7d982c2ac245673ae3eeb2a1
SHA512c69667be93445858b438cd19cc7a79351f6d56e577b7e2086613ea19a917e9ed527ea031aa495b9d4bcab0a20b8749c06763e267af7b702589663d88c7757421