Analysis
-
max time kernel
169s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
Resource
win10v2004-20220812-en
General
-
Target
3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe
-
Size
2.0MB
-
MD5
7b1eeb327613f8e1d4ec2144ec3d3dd9
-
SHA1
4075598183dbda145f17de252acd319279b9d5d8
-
SHA256
3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460
-
SHA512
61b3633f58d96f7d06f3c8941b72d8a12a4539a60a66d221246572d241a5426fd67601b7bc41578cd348acad39dfe41d798ec8f4b60a07189516db51915cef59
-
SSDEEP
24576:GKB58mnEzeDI4SY2SNxSuYPvex2HSC5Y+1YhL7:bqmEBoFx2y1+1
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5044 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 5044 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 1040 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 1040 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 4980 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 4980 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 2904 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 2904 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 1852 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 1852 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 5008 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 5008 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4384 wrote to memory of 5044 4384 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 83 PID 4384 wrote to memory of 5044 4384 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 83 PID 4384 wrote to memory of 5044 4384 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 83 PID 5044 wrote to memory of 1040 5044 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 85 PID 5044 wrote to memory of 1040 5044 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 85 PID 5044 wrote to memory of 1040 5044 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 85 PID 1040 wrote to memory of 4980 1040 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 93 PID 1040 wrote to memory of 4980 1040 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 93 PID 1040 wrote to memory of 4980 1040 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 93 PID 4980 wrote to memory of 2904 4980 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 94 PID 4980 wrote to memory of 2904 4980 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 94 PID 4980 wrote to memory of 2904 4980 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 94 PID 2904 wrote to memory of 1852 2904 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 95 PID 2904 wrote to memory of 1852 2904 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 95 PID 2904 wrote to memory of 1852 2904 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 95 PID 1852 wrote to memory of 5008 1852 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 96 PID 1852 wrote to memory of 5008 1852 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 96 PID 1852 wrote to memory of 5008 1852 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 96 PID 5008 wrote to memory of 1204 5008 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 98 PID 5008 wrote to memory of 1204 5008 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 98 PID 5008 wrote to memory of 1204 5008 3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe"C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe3347a1aae2cc378770c686c679cc2b666142ff39bcd472eda487ab88a0dd7460.exe M8⤵PID:1204
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD5ae3f07b37f66a120eeb0a16d00eff042
SHA1db1d61a84414b829c71a5a4acd76ebba03032890
SHA256e6711279e973b77c7a58f2e73fe695d3c7408ab2c5affd4dd4f4dd2130fa10fe
SHA512bcc62f799ac4ca7fcd1860de25dc5f56f7fc4b4fbdaf0d940435f9bad54a3b8851712dec938f32e2866b0c23ab0a5a6534b58db20b9bf2a79e70ecaf400522ab
-
Filesize
126B
MD583704727be3e00136cc1ab39987c3945
SHA16ef8f469d9fdf5baaa2501ba4042267bdeff6451
SHA256eed3869f248260ab855cd760c7b646e63766ee77f4dd6db956e3663f78297368
SHA51271367dbb34e6b09909fc4aa014ca6603d634c4599c82b8f7590007229ef9babf6c5358c2e91cb33d2144e40be358f61a5302046016e7d719182987a7942b970f
-
Filesize
168B
MD5989758f4820dad78308461872b6270c2
SHA1fca59cf7f458896f035c5b9b462f44b054ec200d
SHA25664fa7b1262f2d38b355a16f6c0085ab98ac569ccb374252a7889660940c62659
SHA51262d60f4f558b1df4f5f2df86acdc0dee71c77d902dcfe7327b0befa0ea8ba851e0dd07dc583ceb62550805bcbf8e8a76ae9ea1cc687de2c7349757b82311ad72
-
Filesize
210B
MD5a04e7067b17e1df6e116bc4462a7f29c
SHA1c0e1dc474accdf78592bc6e6b6e59d9beb7fcae9
SHA2561eeb4a47bf4348929628089922715bb4305a684bea2c90413781414f478fa4c9
SHA5121c765c741438d19a148125220fd262fa2a5329e2ecc1ab40073e67a2c8ac0bc45d0c9b2b58dd79299cf5b02f9d263e2655bd48f1462ad47f817132c7ee10c034
-
Filesize
252B
MD519d5e834ba99dca7210bafbd0e365f97
SHA12fc2e9d972ff0ab63a12d71a27da0e0c7b84426c
SHA256b0e37808571d9d6686dc57b65ef16fa6bd81a55523c3d8ec0521de9f7e2af96e
SHA512905885778e10a3c86c7ed2d41ed7f31e54295b6f9017474410b656e124d3d40fe221979b6fa47f2adb3c884f61222e5c4fc31c2f4f85f3c9176b4e349195babe
-
Filesize
294B
MD56281893dcb5184a5db31faa3e6db2021
SHA1614b4dbb74b6022ec27d21029091327d6ca524a6
SHA2560ed5beceab63df4ee4bf99ae90b36b993465966dc11ebe87295d71c059c689c5
SHA5129f50513c8196321c922614a8f42a37904ebb895ad0baaef05c104543dd6dd12efc4362590ae29b0bb84c9b2bba2408527d71d45ac86f2cbb986fa456c81121a6