Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:53
Behavioral task
behavioral1
Sample
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe
Resource
win10v2004-20221111-en
General
-
Target
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe
-
Size
13KB
-
MD5
8e5213f07151cac86524315a7c394ba3
-
SHA1
f0b653d6d02eba95c1936b5503ef206e4eee010d
-
SHA256
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb
-
SHA512
b1f38a5c3e55b0a7ed5e5a22be9632e3dfcb74a0bdac685978f88319f4cb76ba552aeb9583a27a715180429da30cbd756fc2335531e33776a24f3161ef42191f
-
SSDEEP
384:6sYD24Zs6Si8CD/1fD0HJCvXtiGxATt7kpWy+zS:6sYa4e6Si8ib0pC/tibx7cf
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/1708-54-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exedescription ioc process File opened for modification C:\Windows\SysWOW64\SGCQdll.dat a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe File created C:\Windows\SysWOW64\SGCQdll.dat a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exepid process 1708 a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exepid process 1708 a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe"C:\Users\Admin\AppData\Local\Temp\a0248c95e5f12782cd6d99b77c66546b907fca8756426d0065d1cf53741465fb.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1708-54-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB