Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
Resource
win10v2004-20221111-en
General
-
Target
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
-
Size
61KB
-
MD5
206ae581a574a142505337b4703fa620
-
SHA1
9c4ca19298c103002a23977cfc0562ca40f401a9
-
SHA256
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f
-
SHA512
0d9ac11ba10773726af412a39bbb75d23e137b29c3a8b379b497f488789503de23eeb36525f52e1ebc4ae691e0c34c1dd8abdde1d4888d4ea035fa79b31ee44f
-
SSDEEP
768:+MHj7h5OJxbyoJYdyuxq1KiUR6pC57jJHAo1V635zVVnC40FtGIHGIeJw2sx3oA:Z2JFBYdLxq1KiULHN103klGIHG9kNo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 [email protected] -
Loads dropped DLL 2 IoCs
pid Process 2032 cmd.exe 2032 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2032 1276 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 29 PID 1276 wrote to memory of 2032 1276 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 29 PID 1276 wrote to memory of 2032 1276 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 29 PID 1276 wrote to memory of 2032 1276 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 29 PID 2032 wrote to memory of 1316 2032 cmd.exe 30 PID 2032 wrote to memory of 1316 2032 cmd.exe 30 PID 2032 wrote to memory of 1316 2032 cmd.exe 30 PID 2032 wrote to memory of 1316 2032 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe"C:\Users\Admin\AppData\Local\Temp\43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c [email protected]2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1316
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b