Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe
Resource
win10v2004-20220812-en
General
-
Target
617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe
-
Size
412KB
-
MD5
a0693a04cc76ad0a6116f1f925d903c0
-
SHA1
c826a24b0d466e70bc3367d61eadab7682556e20
-
SHA256
617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232
-
SHA512
c2569373aa50fa9d3040d824db234e9c31f3d2249362b59e3e81c486fefa49ffbc181f4d94c8f649f4be124be92f05075cc428c21248dd91c173793b28606409
-
SSDEEP
6144:g6f6p0X4qumAxSRLnoPhL20gKc1ilJPZNkCLNr3Kr/u2x58uncuCKWYyYCcFV4ry:0p06UI9gKcaLLSdCKqYCemfxDIz
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\WINDOWS\system32\drivers\etc\s2er333vice9.ini 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe -
Executes dropped EXE 1 IoCs
pid Process 1576 requires.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\Realplayer\meter\requires.exe 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 1576 requires.exe 1576 requires.exe 1576 requires.exe 1576 requires.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1576 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 27 PID 1672 wrote to memory of 1576 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 27 PID 1672 wrote to memory of 1576 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 27 PID 1672 wrote to memory of 1576 1672 617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe"C:\Users\Admin\AppData\Local\Temp\617a954ca3243a067efab3543dbb901e6f1a5a0c911f281629acbaa3ab859232.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\program files\Realplayer\meter\requires.exe"c:\program files\Realplayer\meter\requires.exe" "33201"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5fbab42937c76f989e7c0af16f8906936
SHA1940fc1fff39ff60658a1bf9bda6a47d8dc80ff70
SHA256b7cb9c56227bf100e10142ab492aad67226a317a10bfea97dfa07ac66cd94387
SHA5123653a3439fb4d9e2141115c7d711771ec28882e2e224758d020b8b17c18200ccda7bda3edcb7bccf4b8aeab688e5b539930f8afb74971a9723a154325d5e0ee2
-
Filesize
412KB
MD5fbab42937c76f989e7c0af16f8906936
SHA1940fc1fff39ff60658a1bf9bda6a47d8dc80ff70
SHA256b7cb9c56227bf100e10142ab492aad67226a317a10bfea97dfa07ac66cd94387
SHA5123653a3439fb4d9e2141115c7d711771ec28882e2e224758d020b8b17c18200ccda7bda3edcb7bccf4b8aeab688e5b539930f8afb74971a9723a154325d5e0ee2
-
Filesize
412KB
MD5fbab42937c76f989e7c0af16f8906936
SHA1940fc1fff39ff60658a1bf9bda6a47d8dc80ff70
SHA256b7cb9c56227bf100e10142ab492aad67226a317a10bfea97dfa07ac66cd94387
SHA5123653a3439fb4d9e2141115c7d711771ec28882e2e224758d020b8b17c18200ccda7bda3edcb7bccf4b8aeab688e5b539930f8afb74971a9723a154325d5e0ee2