Analysis
-
max time kernel
17s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 08:45
Static task
static1
Behavioral task
behavioral1
Sample
6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe
Resource
win10v2004-20220812-en
General
-
Target
6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe
-
Size
632KB
-
MD5
93f49df0209e5c237043af1e937f6fe3
-
SHA1
9088a61627458eda67e5df86cd60f823a1077d80
-
SHA256
6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec
-
SHA512
2cf037286c07174aabfd0a35b9f64febb65d7021542ba75664edd555781b58320decb5553f270cc8afc24970a261f2bc2a580feffe70d26b2f9bf5308d56c89b
-
SSDEEP
12288:h6Qyv5+vt/2z9olD6669/M+l6nRSciC1qfyI2stDzZ6JvEl+UgKsXBeGdnbH:hO5+v4olDK9/M/PhqV2+Z6JvJVKYeGdr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 ~DFA65.tmp -
Loads dropped DLL 1 IoCs
pid Process 272 6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 272 wrote to memory of 1972 272 6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe 28 PID 272 wrote to memory of 1972 272 6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe 28 PID 272 wrote to memory of 1972 272 6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe 28 PID 272 wrote to memory of 1972 272 6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe"C:\Users\Admin\AppData\Local\Temp\6c81167ad1cefdcc5edc4e59083bf014626f9d840f7e7851eaf8aa83397ebeec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Local\Temp\~DFA65.tmpC:\Users\Admin\AppData\Local\Temp\~DFA65.tmp OK2⤵
- Executes dropped EXE
PID:1972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633KB
MD5ede05f543e88de4709e778e162d3c160
SHA1e62e78f38eb4a3e7e00d7d0c65527a95493145e1
SHA2566a20ca528fc25c39c006db7b3ee6bdfeef605330133b8cc99e86efcae1793ed1
SHA5125125dd7d244b9aa157e67ff341db29a6af832837505702d65953b8680ca8eb285fdc45d23a1f5c29351ccc36a9f3df482ea3d7ffbf5e28d650e3db9af973ad05
-
Filesize
633KB
MD5ede05f543e88de4709e778e162d3c160
SHA1e62e78f38eb4a3e7e00d7d0c65527a95493145e1
SHA2566a20ca528fc25c39c006db7b3ee6bdfeef605330133b8cc99e86efcae1793ed1
SHA5125125dd7d244b9aa157e67ff341db29a6af832837505702d65953b8680ca8eb285fdc45d23a1f5c29351ccc36a9f3df482ea3d7ffbf5e28d650e3db9af973ad05