Analysis
-
max time kernel
30s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe
Resource
win10v2004-20220812-en
General
-
Target
a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe
-
Size
910KB
-
MD5
965316dc9e79e6bbb445b16de79f9a68
-
SHA1
6413051a19cf24a1717335f9b91b8fbe0edc9da7
-
SHA256
a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882
-
SHA512
ed387aadab507810672e4e9582432dcb7d5ba548cdb54665a3129c0995a16e918821f5f2009a41ba2536c17b7385ccf70c83ea770f6a4e14e7326ff91ab26c83
-
SSDEEP
24576:kaznSwcP+HBtSIMvxiSxrCLLBgxWGm6ws5gUj1s1GQ:BnsP+HvSIMpiSxWHBg5BwsaSWF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2012 svchost.exe 2008 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26 PID 1988 wrote to memory of 2012 1988 a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe"C:\Users\Admin\AppData\Local\Temp\a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\a632f2dfa37fa06e79b4e2cab69dcdbf692818fe980167fd4b56f22c5e591882.exe"2⤵
- Executes dropped EXE
PID:2012
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:2008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b