Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2022 18:50
Static task
static1
Behavioral task
behavioral1
Sample
bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe
Resource
win10v2004-20220812-en
General
-
Target
bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe
-
Size
256KB
-
MD5
b357fd60ea922c469d14ddcf2837456f
-
SHA1
b6bb79958701ffe93347f8c6a751d7f0b9a12c4f
-
SHA256
bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25
-
SHA512
1e9e89d6b4970b051aa05bf11317000fd2d465baea5238510efddffdb654b0ad198b8836b5eb2e751046ec56e0485037fd9081171e2989b079e582bb16a4dc9c
-
SSDEEP
3072:5vZibOW+TjQHtoF00IJmJHhljXNNfjfD7sMRCiY0MxNbReZ58bhDt4yJ:5QbuAJmBrjX7HAMRCQMbUPi
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0006000000022e5c-135.dat aspack_v212_v242 behavioral2/files/0x0006000000022e5c-137.dat aspack_v212_v242 behavioral2/files/0x0006000000022e5c-136.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2276 unrar.exe -
Loads dropped DLL 2 IoCs
pid Process 2276 unrar.exe 2276 unrar.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2276 4824 bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe 81 PID 4824 wrote to memory of 2276 4824 bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe 81 PID 4824 wrote to memory of 2276 4824 bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe"C:\Users\Admin\AppData\Local\Temp\bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\~pmetprv\~v31245\unrar.exeC:\Users\Admin\AppData\Local\Temp\~pmetprv\~v31245\unrar.exe "C:\Users\Admin\AppData\Local\Temp\bdb9e782ca75b230ce57dbfe66b3d18552232519ae901666acf8de4b2049aa25.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5bd75e958bbdc2b8dce3ebe69ee2d854e
SHA174b7f40e315120b6b8ff2c0a447f6ef27ab5c566
SHA2568ead2e8dda5fdb0f0dbbf2cec54648906a6e030ca6e4a4787dfc7567b18edda7
SHA5122c775393f4fb4fd159c22575f5e852ff4cdd4f7d5d3b047906c2ba8059d65d6b79d8b9aeb624125a8908d3d010a7b2b34331c9142c1ccc1c64b8e208bb8f4e5d
-
Filesize
85KB
MD5bd75e958bbdc2b8dce3ebe69ee2d854e
SHA174b7f40e315120b6b8ff2c0a447f6ef27ab5c566
SHA2568ead2e8dda5fdb0f0dbbf2cec54648906a6e030ca6e4a4787dfc7567b18edda7
SHA5122c775393f4fb4fd159c22575f5e852ff4cdd4f7d5d3b047906c2ba8059d65d6b79d8b9aeb624125a8908d3d010a7b2b34331c9142c1ccc1c64b8e208bb8f4e5d
-
Filesize
85KB
MD5bd75e958bbdc2b8dce3ebe69ee2d854e
SHA174b7f40e315120b6b8ff2c0a447f6ef27ab5c566
SHA2568ead2e8dda5fdb0f0dbbf2cec54648906a6e030ca6e4a4787dfc7567b18edda7
SHA5122c775393f4fb4fd159c22575f5e852ff4cdd4f7d5d3b047906c2ba8059d65d6b79d8b9aeb624125a8908d3d010a7b2b34331c9142c1ccc1c64b8e208bb8f4e5d
-
Filesize
84KB
MD58c3e44577744a8e42b520ca8243c2a6b
SHA19d16f67201e62e030b3019ba75a42599b5803060
SHA25665d83d458b9a63455609471322d10b37a5f90cf331ae4787ab3fc00b41b5c43e
SHA512bbe5aaaea3a7b68164ffdb87ee66ec4bd34672b2c42c40f6caf093b2e67a594111723a49f59865e17d3eebe1c5745c85aa60ee1abd7690fc8a2c5b7dbb894c91
-
Filesize
84KB
MD58c3e44577744a8e42b520ca8243c2a6b
SHA19d16f67201e62e030b3019ba75a42599b5803060
SHA25665d83d458b9a63455609471322d10b37a5f90cf331ae4787ab3fc00b41b5c43e
SHA512bbe5aaaea3a7b68164ffdb87ee66ec4bd34672b2c42c40f6caf093b2e67a594111723a49f59865e17d3eebe1c5745c85aa60ee1abd7690fc8a2c5b7dbb894c91