Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
Resource
win10v2004-20221111-en
General
-
Target
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe
-
Size
984KB
-
MD5
f25a8e3f5265a57269590b84a506b672
-
SHA1
8413ee5a55d52fd306320f5f1429a55a39bd7a47
-
SHA256
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1
-
SHA512
89e1348e9f62bfa5f3af06b659396cd687511259a7b425720f31de50f0a90e9b9f546a80f56d018ffab8d8379bece5a5a04872f5793f3cbcf849d209959f2095
-
SSDEEP
24576:WiZ4NMlr/acS4uAvgMLAtsXBP70m+V751ac0u+1K6yusNHAAlAPnKV17UipvMySP:9MMlry34usg6AtsRz0r1X0TKHRlAP2dr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Sdmr.exeSdmr.exepid process 972 Sdmr.exe 572 Sdmr.exe -
Drops file in Windows directory 2 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exedescription ioc process File created C:\Windows\Sdmr.exe b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe File created C:\Windows\dmr.exe b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exepid process 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exedescription pid process target process PID 1368 wrote to memory of 972 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 1368 wrote to memory of 972 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 1368 wrote to memory of 972 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe PID 1368 wrote to memory of 972 1368 b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe Sdmr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe"C:\Users\Admin\AppData\Local\Temp\b1a198311d34a09539e8093729235f266caccd9366df00d25335f459798acfd1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Sdmr.exeC:\Windows\Sdmr setup2⤵
- Executes dropped EXE
PID:972
-
C:\Windows\Sdmr.exeC:\Windows\Sdmr.exe1⤵
- Executes dropped EXE
PID:572
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD52bc9ace5bddaa9f70ed0e8fb22489732
SHA1a5de5307a484f0d4deae2c49ac007ce5c49a5fc4
SHA2566a98757092493227b0ba5250b51c33e7cd075e745eaf9dba8e42f67ca484af04
SHA5123005bff9a0c5f6a871e7a4824a98f9f534bbf19a4c30e719a55640cd7e96141babd0b85c7b3bfa6e3e4afdfa7bb98354dcdc158a6d95f1e4c3b518e356ec7a0a
-
Filesize
174KB
MD52bc9ace5bddaa9f70ed0e8fb22489732
SHA1a5de5307a484f0d4deae2c49ac007ce5c49a5fc4
SHA2566a98757092493227b0ba5250b51c33e7cd075e745eaf9dba8e42f67ca484af04
SHA5123005bff9a0c5f6a871e7a4824a98f9f534bbf19a4c30e719a55640cd7e96141babd0b85c7b3bfa6e3e4afdfa7bb98354dcdc158a6d95f1e4c3b518e356ec7a0a