Analysis
-
max time kernel
3s -
max time network
27s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 08:17
Behavioral task
behavioral1
Sample
61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0.exe
Resource
win10v2004-20220812-en
General
-
Target
61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0.exe
-
Size
255KB
-
MD5
d1dd2cf7a5d0dd9ef6f0fa84c9c7a635
-
SHA1
2ce8f163dc431940a3455a38d1e66acbfa247a7b
-
SHA256
61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0
-
SHA512
63a4db03256fb326da8e3453e24fb16181fbfd097bef30dd97da47e0cb1379093f3ff904ce9dae4eb8d60dfda0897cd454df2fb554aaaf06992bffe195139542
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJz:1xlZam+akqx6YQJXcNlEHUIQeE3mmBI0
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0003000000000721-133.dat upx behavioral2/memory/4764-136-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0003000000000725-142.dat upx behavioral2/files/0x0003000000000727-145.dat upx behavioral2/files/0x0003000000000727-144.dat upx behavioral2/memory/4764-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0003000000000725-141.dat upx behavioral2/memory/3080-140-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/files/0x0003000000000723-138.dat upx behavioral2/files/0x0003000000000723-137.dat upx behavioral2/files/0x0003000000000721-134.dat upx behavioral2/memory/5028-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4956-150-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/5032-149-0x0000000000400000-0x00000000004A0000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0.exe"C:\Users\Admin\AppData\Local\Temp\61355aa34d9454f597770e7bd8fdfe93fe71a2edc663853b4e1a862268a3bee0.exe"1⤵PID:4764
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵PID:1288
-
-
C:\Windows\SysWOW64\etobkcaqayckm.exeetobkcaqayckm.exe2⤵PID:4956
-
-
C:\Windows\SysWOW64\mjongmwg.exemjongmwg.exe2⤵PID:5032
-
-
C:\Windows\SysWOW64\bbubpaxabystbjo.exebbubpaxabystbjo.exe2⤵PID:5028
-
-
C:\Windows\SysWOW64\vebmjkaiul.exevebmjkaiul.exe2⤵PID:3080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5c02173450fbda529892aa145f4660eb9
SHA192a960ea30bbd658e658649ec4099d4a2d76062b
SHA25608f66fe2adfc699cddba331c272dc1052cf62fb2ffd31d87ef6da294b3940b79
SHA512cad043a0fea0f9d66ba0e407b0c647314922b3fca6a07a40f97b9afeee89481a7549ac6ffa0068fa2b3a1fb602416d91c3f5ec36e185dc9877a620d1d7043da2
-
Filesize
21KB
MD569252febd44f1c29ead120db1e83858b
SHA154a2d9e117453044f43905ddb7df8e9a0b5cb3f2
SHA2567c654bc514ff5047cecd269a6c6599b84bc7bf88a64d70bb7a5d208dfd61e9c5
SHA5120a120069838da41c967694c5de691a071067211e390a6e5c0989afe9434ff1fa4f3143639994e17b4c1bbf0cae7f73e01231627e67d399352e25d3bce8520965
-
Filesize
29KB
MD592fea1146ecdbe0a37c2221153a090f7
SHA1dc1c2dfa5cd550dd76c720e917cbaa9a0ed60087
SHA2562a768b6bdb1ca07e08a9feab8d38a11f45be551086b2ae4c2377992ba7329677
SHA512abb00a9468cbd68c72f468ecaa610a66f2b8ed06ab3f53c0bbdfef917c3d85bae242a0f48370a4a912c68c0a4ef20b68b4d34017883c79193d62b35e1041e3e9
-
Filesize
24KB
MD5ee661391a94901ba021ea0c6ee0b5559
SHA154dcb090ca49e1f075390d1feca6f8dc70ab8020
SHA256ba1edf3b75f2a9d176b1b6db7cc64ec9a179dc041c6d4b3dfb211e50ffa810fe
SHA512e0d95c48c1b45a7a1d1f94c4c2526d5deddaef6cb27de8bafee33636c33c9f3b9b143dc992a0a15367ab523e1180d5cd531448cbd8eaa6ec6ec951c73aa64577
-
Filesize
55KB
MD59b28f4a78081ed7017195e533ba177b4
SHA1218c18fafa944368c7526d8d4b852022c7c56078
SHA25647bfb5178f91cdf9157b9535fb5e646408034c2cef10d1590cf22b0cd869908b
SHA512873ee48e483347768ea4c6f1c1eead4860a1ff4dfdfae0eb4e93d816d1f50218ee1518871ffabeffdd83b424a92c136b44d05794838d26e4bd8854280c14355e
-
Filesize
44KB
MD5352247b36c1a08ebfd6c01431b8338cd
SHA11a533a0976005b33b72c36ed402748a4b101124d
SHA256dca533b4a493ae5f6fbf7e1e90cfba93b4bb9b7f7dd150f47a9c1583ec2517ba
SHA5121747d0c573fca610d9dbea2170183a2b465e2bb7263cf04b57b8c83b3071f2cc3c50c67a1c8b171c5c83f6f1f6e3b64ac1a2132351b26dd027e9f281b3b3da43
-
Filesize
29KB
MD5fc8dcb79f5b030584b745813ead2e8f1
SHA1a4228dbaec917cdc9cb1d016bae5fbd8276f99b1
SHA25653f6a9d416666910aa1908bfe4366de34dc78db12543996aeaab88bd12fb712c
SHA512e343682ef738b3775f04a6ce5b271fd82d177677a66cded5969562b4197d771122c924b06aa21a879095f7fa1305043c128f4503712e8fe449018b81cc47de5c
-
Filesize
18KB
MD5d66c365bdee52017e7433e74e76eb434
SHA1173220d8860a88b65331dcdc68703dd4274f129e
SHA256befb97e47f4307d383848ab79d3d6731dc72c6f22e6bfe03dd1fe1b489b91c34
SHA512eced4a5d224a67163d51a43de5602161478c8966595401db5f6244c38810dcd035eab16704cb211bc233732b389b83646becda7322e55007b758b50e2120c496