Analysis
-
max time kernel
95s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe
Resource
win10v2004-20220812-en
General
-
Target
e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe
-
Size
652KB
-
MD5
a2e121b382815ba165c458702d62c370
-
SHA1
81b7d58569066faf81bf560712342a9410925848
-
SHA256
e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6
-
SHA512
c64f03dbcb644f8f63a0f7759fe2e3c33b77c923872181a5b68db6217f2aef5fadb81b1e55f964bc187ff18e00fdc7d2c0c52e23fc6241043c9919eeec0ee085
-
SSDEEP
6144:s4UHFnuDk67fe2GzqOxLfPcvgKVPlw9ayXlw9ayK18CRRVMMMMMM2MMMMMS:6luDk67Sz3zKQeW1zRRaMMMMM2MMMMMS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3556 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.com -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\kernel.dll e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe File created C:\Windows\kernel.dll e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe File created C:\Windows\svchost.exe e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3556 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe 81 PID 2448 wrote to memory of 3556 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe 81 PID 2448 wrote to memory of 3556 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe 81 PID 2448 wrote to memory of 3060 2448 e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe 44
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe"C:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.comC:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.com3⤵
- Executes dropped EXE
PID:3556
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.com
Filesize564KB
MD52958b37bab7b1ccb78f0f3722bc072ba
SHA11dd1efca3bb63dbeab7559c174345d47d3113d2d
SHA256dae92d614653b7a99749e1a32b2c9e566570b52cbe31356b74cddf70652732f7
SHA5122d545d55a392bf6749b07101c40d92c58c65b4aa8a3791698c47555be1410f5faabaa7a557551d0f4d903b1113538f2b1d9a1657a3b5e106db184d6bbd9d34cc
-
C:\Users\Admin\AppData\Local\Temp\e2e1c32966f616d4676dcbb8518bbd17b16ca57e1ca74423364cc8a5beeb2ae6.com
Filesize564KB
MD52958b37bab7b1ccb78f0f3722bc072ba
SHA11dd1efca3bb63dbeab7559c174345d47d3113d2d
SHA256dae92d614653b7a99749e1a32b2c9e566570b52cbe31356b74cddf70652732f7
SHA5122d545d55a392bf6749b07101c40d92c58c65b4aa8a3791698c47555be1410f5faabaa7a557551d0f4d903b1113538f2b1d9a1657a3b5e106db184d6bbd9d34cc