Analysis
-
max time kernel
151s -
max time network
168s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:24
Static task
static1
Behavioral task
behavioral1
Sample
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe
Resource
win10v2004-20221111-en
General
-
Target
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe
-
Size
60KB
-
MD5
b7a4236a7638ae190160c2566236b7f7
-
SHA1
b3797b57deb9f58616ffb503ab1c41b8ba1ba465
-
SHA256
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb
-
SHA512
d41e124efef69d893b059d01d8a0826f88f74c3a3613a4ffbb7334a294285d8471f5812b2d86c6a60a52097408a2813ba54132b0ded0338bafb77448388fbd53
-
SSDEEP
768:7S63nijaBuRX1+3YUdL5ZVwPsAePLJJr1hSNbXzIgQ5WZR:O2nuAu6b7wPsAejJRbaDzIgQSR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
735D.tmppid process 792 735D.tmp -
Deletes itself 1 IoCs
Processes:
735D.tmppid process 792 735D.tmp -
Loads dropped DLL 2 IoCs
Processes:
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exepid process 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exedescription pid process target process PID 1388 wrote to memory of 792 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe 735D.tmp PID 1388 wrote to memory of 792 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe 735D.tmp PID 1388 wrote to memory of 792 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe 735D.tmp PID 1388 wrote to memory of 792 1388 494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe 735D.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe"C:\Users\Admin\AppData\Local\Temp\494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\735D.tmp"C:\Users\Admin\AppData\Local\Temp\735D.tmp" "C:\Users\Admin\AppData\Local\Temp\494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb.exe"2⤵
- Executes dropped EXE
- Deletes itself
PID:792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b7a4236a7638ae190160c2566236b7f7
SHA1b3797b57deb9f58616ffb503ab1c41b8ba1ba465
SHA256494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb
SHA512d41e124efef69d893b059d01d8a0826f88f74c3a3613a4ffbb7334a294285d8471f5812b2d86c6a60a52097408a2813ba54132b0ded0338bafb77448388fbd53
-
Filesize
60KB
MD5b7a4236a7638ae190160c2566236b7f7
SHA1b3797b57deb9f58616ffb503ab1c41b8ba1ba465
SHA256494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb
SHA512d41e124efef69d893b059d01d8a0826f88f74c3a3613a4ffbb7334a294285d8471f5812b2d86c6a60a52097408a2813ba54132b0ded0338bafb77448388fbd53
-
Filesize
60KB
MD5b7a4236a7638ae190160c2566236b7f7
SHA1b3797b57deb9f58616ffb503ab1c41b8ba1ba465
SHA256494099164d13a5358b4bde39c24b5701a83a5e86f2fb262d896d1de8caa9b5bb
SHA512d41e124efef69d893b059d01d8a0826f88f74c3a3613a4ffbb7334a294285d8471f5812b2d86c6a60a52097408a2813ba54132b0ded0338bafb77448388fbd53