Analysis
-
max time kernel
48s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
Resource
win10v2004-20221111-en
General
-
Target
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe
-
Size
1016KB
-
MD5
252aec6a18c5150de4638f64a9541dcf
-
SHA1
e854d367d99a9fd1d30cd0a3f6909a4b00dd12a2
-
SHA256
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93
-
SHA512
b5d5336776b3975e2eec78a6b33ae74ab54bec6b2f4be4afe7362349bc83a2e1373e6b51de645732a11a3504b776fbc8ba83acd38cf503425d3cec0ba0ac25fb
-
SSDEEP
24576:ey6L8O4gs6PfbxGH6VMS/bB89vfIABqM:ey6L8O4gs6PTu62S/+vAAUM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Sdmr.exeSdmr.exepid process 956 Sdmr.exe 824 Sdmr.exe -
Drops file in Windows directory 2 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exedescription ioc process File created C:\Windows\Sdmr.exe d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe File created C:\Windows\dmr.exe d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exepid process 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exedescription pid process target process PID 1128 wrote to memory of 956 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe PID 1128 wrote to memory of 956 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe PID 1128 wrote to memory of 956 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe PID 1128 wrote to memory of 956 1128 d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe Sdmr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe"C:\Users\Admin\AppData\Local\Temp\d3a2f90ae75ee400a5bfa5c205937b2983d1de9e002f9a59634c565219f06e93.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\Sdmr.exeC:\Windows\Sdmr setup2⤵
- Executes dropped EXE
PID:956
-
C:\Windows\Sdmr.exeC:\Windows\Sdmr.exe1⤵
- Executes dropped EXE
PID:824
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD50216b1a5d4119db22d7db2f83cb749c0
SHA196b59bdba78e6f6596380bdb50a8e60121829b59
SHA256b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e
SHA51298c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9
-
Filesize
185KB
MD50216b1a5d4119db22d7db2f83cb749c0
SHA196b59bdba78e6f6596380bdb50a8e60121829b59
SHA256b9e10ce8978ab2aff57f30b3101d463f1dc2101e7098f19f2300f228d8d9047e
SHA51298c64cf687c1e0e2b1d5fe04570186cb293012a8de2069c585e91dc5f119efdf71deff16d8f4cf9caff7e0b8938a896d5e68d2e1f06fdedee4826099efae8ff9