Analysis
-
max time kernel
168s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
Resource
win10v2004-20221111-en
General
-
Target
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe
-
Size
61KB
-
MD5
206ae581a574a142505337b4703fa620
-
SHA1
9c4ca19298c103002a23977cfc0562ca40f401a9
-
SHA256
43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f
-
SHA512
0d9ac11ba10773726af412a39bbb75d23e137b29c3a8b379b497f488789503de23eeb36525f52e1ebc4ae691e0c34c1dd8abdde1d4888d4ea035fa79b31ee44f
-
SSDEEP
768:+MHj7h5OJxbyoJYdyuxq1KiUR6pC57jJHAo1V635zVVnC40FtGIHGIeJw2sx3oA:Z2JFBYdLxq1KiULHN103klGIHG9kNo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1284 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1980 wrote to memory of 212 1980 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 84 PID 1980 wrote to memory of 212 1980 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 84 PID 1980 wrote to memory of 212 1980 43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe 84 PID 212 wrote to memory of 1284 212 cmd.exe 85 PID 212 wrote to memory of 1284 212 cmd.exe 85 PID 212 wrote to memory of 1284 212 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe"C:\Users\Admin\AppData\Local\Temp\43bf97794c0c35153549b5a8ec3c46000fdd9ccf142f0fb210f4b9a4952b958f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\cmd.exePID:212
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1284
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize61KB
MD5f18fe9d963100c65d6e259beaf92c3ff
SHA1c7b4e81c8ae3c1286b5156711bcf917e7f3ccd86
SHA256b9b7fb11ef1f215334c673da7f1399d9c24c8c0b1333d18936187a74d3e79500
SHA5121a82d6797d7a5edc8a687fb80973b0c43ef778a1d8258d3e75848531ba6ce198ff1824180dd965e801caa6ddbce75144b217b9f3766256cdcf248fb895672a7b