Analysis
-
max time kernel
73s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
18-11-2022 06:25
Static task
static1
Behavioral task
behavioral1
Sample
ede4e0e4f4547b54a24a170161ae4542.exe
Resource
win7-20221111-en
General
-
Target
ede4e0e4f4547b54a24a170161ae4542.exe
-
Size
163KB
-
MD5
ede4e0e4f4547b54a24a170161ae4542
-
SHA1
7b15b83ebd70c52302e0dea0dea0404026298713
-
SHA256
5411181f4261c8a1b21450ea7376df3d60003b19ad6ad6c6e1fbee2e4b6b8e32
-
SHA512
d602b165419d1c52e612027208e14a6dde2debfe0efc77c10041e9b02f95ddfe0996d1a6b6d3ad212e00a0f51cfe86cc767f38c5610d9f279b0191d169ddd0f4
-
SSDEEP
3072:yK+SWyNc5/9jt5u6hEzsDa6rGYzIhEwJbp9lZdfrD:/lG/Q6hWxwGkjwJbjR
Malware Config
Extracted
systembc
89.248.165.79:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
gstlvn.exepid process 2032 gstlvn.exe -
Drops file in Windows directory 2 IoCs
Processes:
ede4e0e4f4547b54a24a170161ae4542.exedescription ioc process File created C:\Windows\Tasks\gstlvn.job ede4e0e4f4547b54a24a170161ae4542.exe File opened for modification C:\Windows\Tasks\gstlvn.job ede4e0e4f4547b54a24a170161ae4542.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ede4e0e4f4547b54a24a170161ae4542.exepid process 1380 ede4e0e4f4547b54a24a170161ae4542.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1324 wrote to memory of 2032 1324 taskeng.exe gstlvn.exe PID 1324 wrote to memory of 2032 1324 taskeng.exe gstlvn.exe PID 1324 wrote to memory of 2032 1324 taskeng.exe gstlvn.exe PID 1324 wrote to memory of 2032 1324 taskeng.exe gstlvn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ede4e0e4f4547b54a24a170161ae4542.exe"C:\Users\Admin\AppData\Local\Temp\ede4e0e4f4547b54a24a170161ae4542.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
C:\Windows\system32\taskeng.exetaskeng.exe {0F9E9A86-C50D-428C-847C-B174D23EC76A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\ProgramData\lose\gstlvn.exeC:\ProgramData\lose\gstlvn.exe start2⤵
- Executes dropped EXE
PID:2032
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD5ede4e0e4f4547b54a24a170161ae4542
SHA17b15b83ebd70c52302e0dea0dea0404026298713
SHA2565411181f4261c8a1b21450ea7376df3d60003b19ad6ad6c6e1fbee2e4b6b8e32
SHA512d602b165419d1c52e612027208e14a6dde2debfe0efc77c10041e9b02f95ddfe0996d1a6b6d3ad212e00a0f51cfe86cc767f38c5610d9f279b0191d169ddd0f4
-
Filesize
163KB
MD5ede4e0e4f4547b54a24a170161ae4542
SHA17b15b83ebd70c52302e0dea0dea0404026298713
SHA2565411181f4261c8a1b21450ea7376df3d60003b19ad6ad6c6e1fbee2e4b6b8e32
SHA512d602b165419d1c52e612027208e14a6dde2debfe0efc77c10041e9b02f95ddfe0996d1a6b6d3ad212e00a0f51cfe86cc767f38c5610d9f279b0191d169ddd0f4