Analysis
-
max time kernel
44s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe
Resource
win10v2004-20220812-en
General
-
Target
2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe
-
Size
228KB
-
MD5
0dd20a20cbba06d04201df9a74552c0b
-
SHA1
ad4c0823baf320d09da0b5207ad99f4fdddc08ca
-
SHA256
2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8
-
SHA512
f7c824cb6202d4e86cc1c79c15139a1f82e11735d57131281ff493d4282da2b8d4df1ac3aacbfb3b06550337662d33c429bc609a5367d764d30c3f4bad5dbf96
-
SSDEEP
6144:ryH7xOc6H5c6HcT66vlmopZwzxU2LT3JW/cTkUbutD6+pHo4:ra/izL/3JWO5utD6+pHf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 956 svchost.exe 1344 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe 564 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 956 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 956 2016 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe 27 PID 2016 wrote to memory of 956 2016 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe 27 PID 2016 wrote to memory of 956 2016 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe 27 PID 2016 wrote to memory of 956 2016 2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe 27 PID 956 wrote to memory of 1344 956 svchost.exe 28 PID 956 wrote to memory of 1344 956 svchost.exe 28 PID 956 wrote to memory of 1344 956 svchost.exe 28 PID 956 wrote to memory of 1344 956 svchost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe"C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe"C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe"3⤵
- Executes dropped EXE
PID:1344
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:564
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe
Filesize193KB
MD52c083d4ec1fc3e6c3c3fef3fbed5d079
SHA19f900359fa213e51db8e5b047a4ecc94082750d0
SHA256823f7dcd2c940e6f6cd0e9dc7500406e5e497c504b9c53c00fc1a633e2bbe98e
SHA512682e69a08c25fa491402069e35eabf7a25581f698107cbaf792f886ac4bff857a231d3b1a35ce6f8ddf0a9e20021f9822e128fa75732345318cd216ce079c790
-
Filesize
35KB
MD59fa01d7a17edc17a5e853e5186f88032
SHA18b2ad9aeb04146720144c4ce1dc5ee16bf128016
SHA256263f764ab8a82e520bc075f099de9f3d233c3cbdb8fbb839f76f899bc16b916d
SHA512df0fc54ff0a2d1bc563271276a24c1bac62878231da578068bb9677f405464cfacb5472852ab74a5ac7268a39474eceab5b11f0010c156745fea52947e3e83b0
-
Filesize
35KB
MD59fa01d7a17edc17a5e853e5186f88032
SHA18b2ad9aeb04146720144c4ce1dc5ee16bf128016
SHA256263f764ab8a82e520bc075f099de9f3d233c3cbdb8fbb839f76f899bc16b916d
SHA512df0fc54ff0a2d1bc563271276a24c1bac62878231da578068bb9677f405464cfacb5472852ab74a5ac7268a39474eceab5b11f0010c156745fea52947e3e83b0
-
Filesize
35KB
MD59fa01d7a17edc17a5e853e5186f88032
SHA18b2ad9aeb04146720144c4ce1dc5ee16bf128016
SHA256263f764ab8a82e520bc075f099de9f3d233c3cbdb8fbb839f76f899bc16b916d
SHA512df0fc54ff0a2d1bc563271276a24c1bac62878231da578068bb9677f405464cfacb5472852ab74a5ac7268a39474eceab5b11f0010c156745fea52947e3e83b0
-
\Users\Admin\AppData\Local\Temp\2317f2fa6f7a36fd497839107003bd9018bda3e1cf8316025c0e590754f565a8.exe
Filesize193KB
MD52c083d4ec1fc3e6c3c3fef3fbed5d079
SHA19f900359fa213e51db8e5b047a4ecc94082750d0
SHA256823f7dcd2c940e6f6cd0e9dc7500406e5e497c504b9c53c00fc1a633e2bbe98e
SHA512682e69a08c25fa491402069e35eabf7a25581f698107cbaf792f886ac4bff857a231d3b1a35ce6f8ddf0a9e20021f9822e128fa75732345318cd216ce079c790