Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 22:41
Behavioral task
behavioral1
Sample
5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe
Resource
win10v2004-20220901-en
General
-
Target
5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe
-
Size
200KB
-
MD5
a3aa8aaaf354ba561af99d0f71d227a0
-
SHA1
9e9bdf30dc1a89464508089cd21b1f343b0777c6
-
SHA256
5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0
-
SHA512
59570bfaa9a5f8b7ee7f43bd3ef41be056a31e831e005db99ac85a650530c4d605cf7f854af97f6d00a75027d71d3457a871a530ff2d07fc142240dfc4dbbf44
-
SSDEEP
6144:dgCWIYMphOUiXITB2XM+OE9olTkhgDergC2Of3j:dP2MqUyaB+M+mkhzkC2s3j
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\King_ar = "C:\\Windows\\system32\\arking.exe" 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\arking.exe 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe File created C:\Windows\SysWOW64\arking.exe 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe File opened for modification C:\Windows\SysWOW64\arking0.dll 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe File created C:\Windows\SysWOW64\arking0.dll 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1412 1720 5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe"C:\Users\Admin\AppData\Local\Temp\5210c3babc13182beb327b6cc16fd8189783ddd87af5b1ed817fee8721ba71a0.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5fc03ff764ceae787d5b97c8518530ba6
SHA1616f770636d4f4015f3a115d6997304ee9f266eb
SHA25661b9a9e318d27b642e86b633399afe993ce7f96f43f1972c6850f3779d0528dc
SHA512b0217878ad2d9ce30a45a553d0c459ad4b50558cfe973f44fa56ea1e171b5990d5fbd527115d194dcb5a999f4c12159d0c277203ee6e038b75de91d69d5c4106