Analysis
-
max time kernel
39s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe
Resource
win10v2004-20220812-en
General
-
Target
2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe
-
Size
135KB
-
MD5
0b0f3c19368146c8c6d4afca5d8f1310
-
SHA1
01448b0c583e0bf660d96c801b8b48fd994978c4
-
SHA256
2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131
-
SHA512
07459dc96b8234cedf253f120e39df4e2f781179b71f5cf31ba8ebe70c98f71e66a49ba1f15bfc386f3e916b8e102043761d3743e6a3f11ee114b8c12972674e
-
SSDEEP
3072:jO7ADbDlkSO9GnRrda5rHitOuI7QR1OhIgdHcjCNout:K7AD/lkDGnRr8xCMQGqKmgoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 msprxysvc32.exe -
Deletes itself 1 IoCs
pid Process 1712 msprxysvc32.exe -
Loads dropped DLL 2 IoCs
pid Process 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe File created C:\Windows\SysWOW64\msprxysvc32.exe 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1112 wrote to memory of 1712 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe 28 PID 1112 wrote to memory of 1712 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe 28 PID 1112 wrote to memory of 1712 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe 28 PID 1112 wrote to memory of 1712 1112 2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe 28 PID 1712 wrote to memory of 1228 1712 msprxysvc32.exe 29 PID 1712 wrote to memory of 1228 1712 msprxysvc32.exe 29 PID 1712 wrote to memory of 1228 1712 msprxysvc32.exe 29 PID 1712 wrote to memory of 1228 1712 msprxysvc32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe"C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\msprxysvc32.exeC:\Windows\system32\msprxysvc32.exe 516 "C:\Users\Admin\AppData\Local\Temp\2b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\msprxysvc32.exe3⤵PID:1228
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD50b0f3c19368146c8c6d4afca5d8f1310
SHA101448b0c583e0bf660d96c801b8b48fd994978c4
SHA2562b789adfa10ff56c8fe5be06b0bdf1a1a3ff8ca75bd45c7db0690183e01d8131
SHA51207459dc96b8234cedf253f120e39df4e2f781179b71f5cf31ba8ebe70c98f71e66a49ba1f15bfc386f3e916b8e102043761d3743e6a3f11ee114b8c12972674e
-
Filesize
92KB
MD565b486a78b8598d1d14c250ff20773da
SHA137e5fac69d25cf92b61aba9d7b6fafd5817fa076
SHA256e41fec3a255f146a69c68b7d294c3e88aaccaabf61881e164c6de0e74a6ec4ec
SHA512a962876f671055576743702b899f00644bbd38702a6920821774c4bdc9445b93460825c269cf8f506b53ad215bf2773814d82d130644a9667704c094890891cb
-
Filesize
88KB
MD5891b4dd32cbe244fd83b74353ecbe2f3
SHA14008e1bbdedfe31a9bf300e9d19eeebafe84cffb
SHA25667b3d12a98171cd455eadac81f65a635106657c4b204db6e316528b63d9f77f6
SHA5127ca0c25421a1d15d5064d47cadd0ca9bcd82e656c71382b777a101ec17b2c4419b9b3c50c5727a027c4da9221fa7a04d1ec61997255157eec5ad88630e67608e
-
Filesize
71KB
MD566842bbf3dcb3351fd7c1d525d3c79a6
SHA1c3f17f423c947c8ff9c3f32f1ca9767ea2f90146
SHA2567bfa59d1d46c8f911a8664e5ff5ef16156a425ce3807ddeea3dc2c6017c0f898
SHA512db172737d8678122c3df2b1652e21decc5aeeac982f4cce44a4ff0d638a0e5bb846628be58fd0425713ed20981e54ea3087d67894c890386475fcc566079f27a