Analysis
-
max time kernel
171s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe
Resource
win10v2004-20221111-en
General
-
Target
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe
-
Size
2.5MB
-
MD5
28e3f37100979d7b6f3570e859c589c0
-
SHA1
032492445d4ed3fe02c61f22f60c72883bdab5f1
-
SHA256
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d
-
SHA512
831bd2e73607d5379a4ffef5c5a68b9e0c35e22cf68979ca146a9b0bfbcc4497276e0c4a05147d5278326d1af6fb946c95e0f259748289c5fe475659fe460f41
-
SSDEEP
49152:i9qIaIQB8h6v7sFfsE/nqoATFlOaeAFAMJMKpu68G4spIhBkbMEW:sqZBOwvknqfTFluAFtpu6QsehB6M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmppid process 3224 ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
Processes:
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmpdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\K7 Computing\K7TotalSecurity ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Sophos\Sophos Anti-Virus ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\KasperskyLab ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exedescription pid process target process PID 3348 wrote to memory of 3224 3348 ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp PID 3348 wrote to memory of 3224 3348 ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp PID 3348 wrote to memory of 3224 3348 ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe"C:\Users\Admin\AppData\Local\Temp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\is-Q31B9.tmp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp"C:\Users\Admin\AppData\Local\Temp\is-Q31B9.tmp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp" /SL5="$8004A,2314620,56832,C:\Users\Admin\AppData\Local\Temp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.exe"2⤵
- Executes dropped EXE
- Checks for any installed AV software in registry
PID:3224
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-Q31B9.tmp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp
Filesize693KB
MD55fce05097d5700989ffc2af6e322cf09
SHA1814ad12dc87d52bba4cb547a03e2679f60fa400a
SHA25620b21070a6f03022b233994e67f451929bdbf259fce6a6c9501557b369bc093e
SHA51231d66f10d76b4ffc95511bcca1e21392fb7b67b9184236f0818a5ff8f4e3dd337de358c2b2c76a5f6bf4b4a2c186d91e4762a598f90eee48cd8f40a55bdc7e2f
-
C:\Users\Admin\AppData\Local\Temp\is-Q31B9.tmp\ed3111c0a18df6f1a0f259551041d35e17d4b53b560f907676cb00748677ed5d.tmp
Filesize693KB
MD55fce05097d5700989ffc2af6e322cf09
SHA1814ad12dc87d52bba4cb547a03e2679f60fa400a
SHA25620b21070a6f03022b233994e67f451929bdbf259fce6a6c9501557b369bc093e
SHA51231d66f10d76b4ffc95511bcca1e21392fb7b67b9184236f0818a5ff8f4e3dd337de358c2b2c76a5f6bf4b4a2c186d91e4762a598f90eee48cd8f40a55bdc7e2f