Analysis
-
max time kernel
26s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22/11/2022, 08:34
Static task
static1
Behavioral task
behavioral1
Sample
e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe
Resource
win10v2004-20220901-en
General
-
Target
e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe
-
Size
5.5MB
-
MD5
e086adf0694d7e3cd546bff5426d7699
-
SHA1
e5c9542d80dd78924c425d73ab007702108fda90
-
SHA256
e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38
-
SHA512
a7ea59f9989d75cd261b4abeefa7f406533c356a9cf8ce6373d4e4bf35ac7634823374f8038233b522dfdf54b1790ce2adfe5c98285a6cae567841202cfc04f5
-
SSDEEP
98304:skLlDnTP0AIPSnkyXFbFqvb9/vJtkh7dAy9QdB4BC+4fo8os9YYHo9ti55ljy:LlzTP0LBgwbV50aB4hjYIj0n2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1156 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp -
Loads dropped DLL 2 IoCs
pid Process 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 1156 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28 PID 1144 wrote to memory of 1156 1144 e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe"C:\Users\Admin\AppData\Local\Temp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\is-88GO8.tmp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp"C:\Users\Admin\AppData\Local\Temp\is-88GO8.tmp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp" /SL5="$70124,4926676,832512,C:\Users\Admin\AppData\Local\Temp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-88GO8.tmp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp
Filesize3.0MB
MD55225f0bd978edca0ebe6806d8996870e
SHA12bdafb0c3fa216d125f221ec56319bb0426d322b
SHA2567bc2fc59c652644684717cf1661ee069971a32d44669eb58d5e152cab0e7b736
SHA5122a3e9fbfd0837f506a47dc704a2a9e6ea1994b9d076ae4ff9ba22a5f20f7aa47849c54c5b0fc73e855d91b1eada94a5213376ba7132e650bdbe8af8c78e26fd2
-
\Users\Admin\AppData\Local\Temp\is-88GO8.tmp\e6911dd8ffac23601634befb567340ce7a390e5f86859bfc8e5a2489a8852c38.tmp
Filesize3.0MB
MD55225f0bd978edca0ebe6806d8996870e
SHA12bdafb0c3fa216d125f221ec56319bb0426d322b
SHA2567bc2fc59c652644684717cf1661ee069971a32d44669eb58d5e152cab0e7b736
SHA5122a3e9fbfd0837f506a47dc704a2a9e6ea1994b9d076ae4ff9ba22a5f20f7aa47849c54c5b0fc73e855d91b1eada94a5213376ba7132e650bdbe8af8c78e26fd2
-
Filesize
287KB
MD5a3cc6c56abeecfb5dfa33019b3696045
SHA10193c28b906d8d1d72c344b6ad63060967d30b12
SHA25663691e210c8fdcd061c6d6bcf19b2521e7bad75eb3c10487a65432b7d0537cea
SHA512555d24ae1d673754b645daa28637517b236b5032681d6d5904393ffa2d1010a84c5d7f61206978b824c1050fa52e6cbb0064c2e4cb2dec96c1ead9cbc142587a