Analysis
-
max time kernel
31s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe
Resource
win10v2004-20220812-en
General
-
Target
3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe
-
Size
72KB
-
MD5
0c3db4408cf9bbc6aa50a19792832af0
-
SHA1
3c9872aa3163d6d2cf51535b552068bdd457c8d2
-
SHA256
3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c
-
SHA512
e3c5a5f6040cfe5929b1b0a22e30780591b790c2b4912052f5d44d7843daa5e7d2c04d85c75eb4ed2334d526fac5fe08011a04170e2ac0c212f145ae8940fd9a
-
SSDEEP
1536:B+HTyoSc9CzlJ62Dp76vRFzUrTgZQoPig3GcG995sNI:e+sc8dUrTAW7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 824 cmd.exe 824 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1620 wrote to memory of 824 1620 3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe 28 PID 1620 wrote to memory of 824 1620 3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe 28 PID 1620 wrote to memory of 824 1620 3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe 28 PID 1620 wrote to memory of 824 1620 3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe 28 PID 824 wrote to memory of 1748 824 cmd.exe 29 PID 824 wrote to memory of 1748 824 cmd.exe 29 PID 824 wrote to memory of 1748 824 cmd.exe 29 PID 824 wrote to memory of 1748 824 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe"C:\Users\Admin\AppData\Local\Temp\3c554a6f6ce43329811d84cfbcc590f6faed7ce7e3b79446fb1c0ff90eb4780c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1748
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD57fc33887b26592c0f2ccfcd79d2cdcbb
SHA19d05b772d50d79b76c38b62f642262f6c0a326e8
SHA256b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427
SHA512ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD57fc33887b26592c0f2ccfcd79d2cdcbb
SHA19d05b772d50d79b76c38b62f642262f6c0a326e8
SHA256b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427
SHA512ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD57fc33887b26592c0f2ccfcd79d2cdcbb
SHA19d05b772d50d79b76c38b62f642262f6c0a326e8
SHA256b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427
SHA512ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize72KB
MD57fc33887b26592c0f2ccfcd79d2cdcbb
SHA19d05b772d50d79b76c38b62f642262f6c0a326e8
SHA256b49b5df4344f3bcc60db82e11ddd4ce0a48b6c87cface4dacd605699ebb4e427
SHA512ac00b2aba501cac123d6fd69830f1ca5386925ace914cd3155033528a47f2e362d4535d5c31f38eedbb2fb2772ccdf4eee911caf7697e3caf1e804808bff8c42