Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:03
Static task
static1
Behavioral task
behavioral1
Sample
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe
Resource
win10v2004-20220812-en
General
-
Target
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe
-
Size
966KB
-
MD5
a8296d5099d941f523faba19fe59db51
-
SHA1
19a988e943ba9231a19cab94ae630e2981cfc763
-
SHA256
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908
-
SHA512
c4105f65bf13d758e3d3a61199d1191e057d450992d95beb4b2ff4c2a94ff728ab5275f92d0728a2fda9e8f242f181f1712a6a569d65ac66d8e3f0978cb7d315
-
SSDEEP
24576:Xk+vQrxqC0IHDeX2fY0JaK1/F7jvAPo9eOOARbgZ+MrLQt:Xk+YiIHA0F1tjvMoOAgwMnQt
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
Processes:
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exepid process 3836 c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe 3836 c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe 3836 c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe 3836 c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe 3836 c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe -
Drops file in System32 directory 1 IoCs
Processes:
c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exedescription ioc process File created C:\Windows\SysWOW64\GLBSINST.%$D c93c3944cb8c3e495744a6f017d8c4d8f31b574105da5e41fd99956a23e99908.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\GLCF513.tmpFilesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
C:\Users\Admin\AppData\Local\Temp\GLHF68B.tmpFilesize
33KB
MD5b4bfa3e42692e76a00e3b7f9cfc7d876
SHA13fe49338f88a3b26b32088a00f3c0d4c22c1595b
SHA256101210bdecfc7deab857224f7f35cbe00bdd068581c26c8a08768b0a8a1c264d
SHA512ad6a1e76e214966066528ccaba0179b9046359b56815d597759c1e2e28359d5c51a7b4898e4a5206b3a5c6a6c067840c726cd6e99aa99385b814e91a045bb2c4
-
C:\Users\Admin\AppData\Local\Temp\GLHF68B.tmpFilesize
33KB
MD5b4bfa3e42692e76a00e3b7f9cfc7d876
SHA13fe49338f88a3b26b32088a00f3c0d4c22c1595b
SHA256101210bdecfc7deab857224f7f35cbe00bdd068581c26c8a08768b0a8a1c264d
SHA512ad6a1e76e214966066528ccaba0179b9046359b56815d597759c1e2e28359d5c51a7b4898e4a5206b3a5c6a6c067840c726cd6e99aa99385b814e91a045bb2c4
-
C:\Users\Admin\AppData\Local\Temp\GLKF8ED.tmpFilesize
33KB
MD53afff622b9736ab03c21b156da978c01
SHA110821b02e6878b1beb11187fa470f861221c3e81
SHA25648ef1e6f04e455d1a354f2a512de7ff85c0c2a3b5cd3497a76ebe77a8318df6c
SHA51230de83a83b555b18b679dec0edd66552e2374707966efa286c9843dc24a61a2d7c57fd574561478cc9aa74f55fc42527b2ce06b281e17134c4fa8a17a9c213fd
-
C:\Users\Admin\AppData\Local\Temp\GLKF8ED.tmpFilesize
33KB
MD53afff622b9736ab03c21b156da978c01
SHA110821b02e6878b1beb11187fa470f861221c3e81
SHA25648ef1e6f04e455d1a354f2a512de7ff85c0c2a3b5cd3497a76ebe77a8318df6c
SHA51230de83a83b555b18b679dec0edd66552e2374707966efa286c9843dc24a61a2d7c57fd574561478cc9aa74f55fc42527b2ce06b281e17134c4fa8a17a9c213fd
-
memory/3836-135-0x0000000002230000-0x000000000223D000-memory.dmpFilesize
52KB
-
memory/3836-138-0x0000000002241000-0x0000000002243000-memory.dmpFilesize
8KB