Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe
Resource
win10v2004-20220901-en
General
-
Target
93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe
-
Size
135KB
-
MD5
030df85c217df38519b39068f618466f
-
SHA1
8d7110a48796b394fd3b6f0f1ca507e7e3b98a0b
-
SHA256
93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d
-
SHA512
6902de20f690cba1c911757d7dc35120f711073ff67b93267c439f7b0442b3224baaf0ef9fbbb33bb4ff3685fd0c7e0624f771ecf084466a91fd175482a3979d
-
SSDEEP
3072:J39yKlSEeJoZbJBxbqafVi7GGJ0zOng6DMWUNP+ZEGSibME2qout:J3ANvJoZd2zZWzIn3aQ3PZoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 msprxysvc32.exe -
Deletes itself 1 IoCs
pid Process 1712 msprxysvc32.exe -
Loads dropped DLL 2 IoCs
pid Process 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe File created C:\Windows\SysWOW64\msprxysvc32.exe 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 544 wrote to memory of 1712 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe 26 PID 544 wrote to memory of 1712 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe 26 PID 544 wrote to memory of 1712 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe 26 PID 544 wrote to memory of 1712 544 93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe 26 PID 1712 wrote to memory of 940 1712 msprxysvc32.exe 27 PID 1712 wrote to memory of 940 1712 msprxysvc32.exe 27 PID 1712 wrote to memory of 940 1712 msprxysvc32.exe 27 PID 1712 wrote to memory of 940 1712 msprxysvc32.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe"C:\Users\Admin\AppData\Local\Temp\93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\msprxysvc32.exeC:\Windows\system32\msprxysvc32.exe 544 "C:\Users\Admin\AppData\Local\Temp\93bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\msprxysvc32.exe3⤵PID:940
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bfcf9cc6d1c37953dfa43312e2c36140
SHA107a4c0f29b282c34be24c312c4b920e479f4cee0
SHA256bac7cce52aeba3a2e2ce2bb6aebf50ffa65530d0d51ca49a2abc7f4e43ce3ce5
SHA512fb661474557e7168d4050607863b57649fa12a26ab9bd06078ae3254d003d76cfed4eac3d0a78a56eaf0ecc5b231d52788b6c8688cb14b0c86a37efe90f5f53a
-
Filesize
135KB
MD5030df85c217df38519b39068f618466f
SHA18d7110a48796b394fd3b6f0f1ca507e7e3b98a0b
SHA25693bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d
SHA5126902de20f690cba1c911757d7dc35120f711073ff67b93267c439f7b0442b3224baaf0ef9fbbb33bb4ff3685fd0c7e0624f771ecf084466a91fd175482a3979d
-
Filesize
135KB
MD5030df85c217df38519b39068f618466f
SHA18d7110a48796b394fd3b6f0f1ca507e7e3b98a0b
SHA25693bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d
SHA5126902de20f690cba1c911757d7dc35120f711073ff67b93267c439f7b0442b3224baaf0ef9fbbb33bb4ff3685fd0c7e0624f771ecf084466a91fd175482a3979d
-
Filesize
135KB
MD5030df85c217df38519b39068f618466f
SHA18d7110a48796b394fd3b6f0f1ca507e7e3b98a0b
SHA25693bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d
SHA5126902de20f690cba1c911757d7dc35120f711073ff67b93267c439f7b0442b3224baaf0ef9fbbb33bb4ff3685fd0c7e0624f771ecf084466a91fd175482a3979d
-
Filesize
135KB
MD5030df85c217df38519b39068f618466f
SHA18d7110a48796b394fd3b6f0f1ca507e7e3b98a0b
SHA25693bd25d51aed1e475325d567a267b20457d3ac98e6185f935f05254ae4781b8d
SHA5126902de20f690cba1c911757d7dc35120f711073ff67b93267c439f7b0442b3224baaf0ef9fbbb33bb4ff3685fd0c7e0624f771ecf084466a91fd175482a3979d