Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe
Resource
win10v2004-20220901-en
General
-
Target
6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe
-
Size
339KB
-
MD5
0c5f86961f640d9b09f09d2940771671
-
SHA1
b0580a84b79fdf6ad919ce09236220c5177deee3
-
SHA256
6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331
-
SHA512
693c154f29877a90c9b4df310c21dba08886e0fbbdae6810d212acaaad615a6891df1775ea01532af965a2637958a583c3f37536af9b03a0af76b80ce36caca0
-
SSDEEP
3072:CcnXZUOqqY8bOsgEYZKSxSQx+lRg+DoHVAx1n6g:CsZkqY3ESKSxSaQgqoHWXnb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2320 wininit32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\wininit32.exe 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe File opened for modification C:\Windows\SysWOW64\wininit32.exe 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe File created C:\Windows\SysWOW64\wininit32.exe wininit32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 2320 wininit32.exe 2320 wininit32.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 2320 wininit32.exe 2320 wininit32.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 2320 wininit32.exe 2320 wininit32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3404 wrote to memory of 2320 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 82 PID 3404 wrote to memory of 2320 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 82 PID 3404 wrote to memory of 2320 3404 6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe"C:\Users\Admin\AppData\Local\Temp\6322b718f762c451d185e0ed48c4e9ed3764d1bfcbb31ac7997ff530622f2331.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\wininit32.exeC:\Windows\system32\wininit32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
353KB
MD598abfcd88f8ac3327ca9edaaf558fbfa
SHA1a6074d64b6237a6d1c9b06435cc8a13b647d15a9
SHA256cb93babeb7fa15b1eba0087729cc81367cb87cb3151c4478f09976e8b2bf331f
SHA5123ad40152cf7fca1ea92fd759e125abf79848b9d4dc5e39e5b5aeeaf31a398bbeabe7c358d63d0065e49a058d63363cadbf75421a4e20b104c3fb6aa25790aae8
-
Filesize
353KB
MD598abfcd88f8ac3327ca9edaaf558fbfa
SHA1a6074d64b6237a6d1c9b06435cc8a13b647d15a9
SHA256cb93babeb7fa15b1eba0087729cc81367cb87cb3151c4478f09976e8b2bf331f
SHA5123ad40152cf7fca1ea92fd759e125abf79848b9d4dc5e39e5b5aeeaf31a398bbeabe7c358d63d0065e49a058d63363cadbf75421a4e20b104c3fb6aa25790aae8