Analysis
-
max time kernel
149s -
max time network
246s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:34
Static task
static1
Behavioral task
behavioral1
Sample
37de64b99682484279f81911840da0e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
37de64b99682484279f81911840da0e9.exe
Resource
win10v2004-20221111-en
General
-
Target
37de64b99682484279f81911840da0e9.exe
-
Size
700KB
-
MD5
37de64b99682484279f81911840da0e9
-
SHA1
77508881129ba06fcc0f99633900cb25d17f2e19
-
SHA256
13e6ff5cb9fdf2ba6560edda8afa17724d14122dd087af29004c7684cb6c4252
-
SHA512
73df3a16038fe07126e8b39da5f2e88170d3e312890f25d5f2d371bbcaab516bb5b25220d5ff4e2bd5bade5c343136b0893e8304927c865fadd71f0a50e230b4
-
SSDEEP
12288:LjuRRtahe+F+8OxQa3FxvNW5RtAlwc3hr6xkH:LqRTao+cxLVpCRtUwckxm
Malware Config
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\E_N60005\krnln.fnr aspack_v212_v242 \Users\Admin\AppData\Local\Temp\E_N60005\eAPI.fne aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
AMS.exepid process 808 AMS.exe -
Loads dropped DLL 9 IoCs
Processes:
37de64b99682484279f81911840da0e9.exeAMS.exepid process 1492 37de64b99682484279f81911840da0e9.exe 1492 37de64b99682484279f81911840da0e9.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
37de64b99682484279f81911840da0e9.exeAMS.exepid process 1492 37de64b99682484279f81911840da0e9.exe 808 AMS.exe 808 AMS.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
37de64b99682484279f81911840da0e9.exeAMS.exepid process 1492 37de64b99682484279f81911840da0e9.exe 1492 37de64b99682484279f81911840da0e9.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe 808 AMS.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
37de64b99682484279f81911840da0e9.exedescription pid process target process PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe PID 1492 wrote to memory of 808 1492 37de64b99682484279f81911840da0e9.exe AMS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37de64b99682484279f81911840da0e9.exe"C:\Users\Admin\AppData\Local\Temp\37de64b99682484279f81911840da0e9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\AMS.exeC:\Users\Admin\AppData\Local\Temp\AMS.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:808
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
7.3MB
MD59dcf15542011cbfeb49c2081dc7b2cb5
SHA1639616c735fedda841f9ff6e366298181604e632
SHA256af627addc0146dfa2e5c4c60e755397245d74469b5898f1887ba8db82afb37c5
SHA512f992aaad4fb5af0e6843dc35230841880e33405220ed57fc4d508ca1b85f38d69fc78bce32c909422c6ee9a43da18439955186f10988b942b0a6db0779c3dc4e
-
Filesize
1.9MB
MD537366c1f3b98360ad781499cf90b02e9
SHA1ac6c292a9528730c46c3e5c901fc98b4db687f1c
SHA2566a6a1c72016470034c8ad3ce8abd4a2322e113fc500f0de40c5bb1100e4179f3
SHA512530b80af23d75535f0aa9aebe7c84f3c09aee7a6075a338546a634efccbc675874e7ad7e46ca2bee523bba4deadf3a4e6fc70b3d549b7144a8667c0d19f607e9
-
Filesize
156KB
MD54bfd2196a035808bc2108909d70f40e0
SHA12055e2f5faebe89c39bb54000cabd77f2f684294
SHA256b8c03b0f0dfdde3fe33ac63b9322a1f72ef56748c8cde860a320ac9d6f868adc
SHA512b845d2b6309434600a5e922bebb43d9305d4316fff0b7d59aa0615e5aa68a3a112737f733d141e56a1b87b0631d6c66ca18a0273e16632598ccf3bee99d4da46
-
Filesize
597KB
MD5e20929ea2cd3cc34b3b6f30cc6a4d723
SHA131793f3f10f0964b50826e10df74e36002e2f9e5
SHA25696e1778537df3ce9868806f4ff4b9b1eb682a7f52e33497cfa4f6fefbd164584
SHA512cd6f7e914bdff45977c058b49a60cd25f6a8d12838096ff63fb433de23a3705a679ede6be628c298ede5c9a42465a26864b6bbff03fc4bca6128cec764614931
-
Filesize
14KB
MD5cbe7b9dbe063b6f94b1b53e936f6c0a4
SHA19dc41d44da76f65f00bd74e59cfb2be07f19756a
SHA256f7f2a1dee67bb04b990d04eae4fd5d83a4b415b0ccfba83d557f1373b0119f36
SHA51281580a1beb8594ec8687b680338f2ff7cec5af312ff28cab4aaa63ce3aeac6d5cf26b00e8bd42cfce29439d65a41211bbb796f6d80498642de3271c834a7a129