Analysis
-
max time kernel
43s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
Resource
win10v2004-20220812-en
General
-
Target
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
-
Size
226KB
-
MD5
4a4b2303320a0ba42476b20ed3badee0
-
SHA1
c7754ad51ca9acd1eb630747002803766659d483
-
SHA256
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591
-
SHA512
d469d56a12a7baa4a411984fab994dc4e00d58fc27b0f3418d4cdb59dada7497ef9e44ddd94ee4065994103778b72f0c9cddb3b112f44132774391f87b184b09
-
SSDEEP
6144:6yH7xOc6H5c6HcT66vlmq9WIZOAIpl+4vcHz9ek6Rz6oSarz6Bmzpf7g8:6aXZNID3Ueko6oSHUV7g8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1216 svchost.exe 900 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1216 1564 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 26 PID 1564 wrote to memory of 1216 1564 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 26 PID 1564 wrote to memory of 1216 1564 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 26 PID 1564 wrote to memory of 1216 1564 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"2⤵
- Executes dropped EXE
PID:1216
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:900
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c