Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
Resource
win10v2004-20221111-en
General
-
Target
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe
-
Size
523KB
-
MD5
447e6bbe593e938286009d7277fd4e20
-
SHA1
35f9c56a57125bbb37942119ddfce10e00a32ed1
-
SHA256
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc
-
SHA512
30b8da45aa338be9a99f95d66fd9b5dbeb95f61f0718c7eaf0bfc04753ff54a5b3ca8de81f36c98e69eb5ca2fed4e3ae2e6c245b97afbf199598cdb2706f8b3b
-
SSDEEP
12288:Fy48WEX0PAaDvdx8ZKEg2hyeJxVGeDQpgQgtf2LJVO7Lz:FynqIwdxcbg2h0Yv2K3z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exepid process 1188 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe upx \Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe upx behavioral1/memory/1188-60-0x0000000000400000-0x0000000000461000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe upx -
Loads dropped DLL 2 IoCs
Processes:
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exepid process 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exedescription pid process target process PID 1416 wrote to memory of 1188 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe PID 1416 wrote to memory of 1188 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe PID 1416 wrote to memory of 1188 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe PID 1416 wrote to memory of 1188 1416 d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe"C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exeC:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe2⤵
- Executes dropped EXE
PID:1188
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe
Filesize155KB
MD560b4a01f8e198b8857f674ca6a809d75
SHA16b9667a5210cf76d730e4305ebc5417187009d2a
SHA2566e9f1ec2429a8bedf6a886d97a22d4fc37cec011f697fd6368d5ebb3b5b01071
SHA512b7045cc893bccfe3cc7881c42ad903dc23962702c24e7c797071a68a7463b27822a3b77a82fd5ed1c939f12fe4f1ff944c9a436097f96bf2ca00732595236744
-
\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe
Filesize155KB
MD560b4a01f8e198b8857f674ca6a809d75
SHA16b9667a5210cf76d730e4305ebc5417187009d2a
SHA2566e9f1ec2429a8bedf6a886d97a22d4fc37cec011f697fd6368d5ebb3b5b01071
SHA512b7045cc893bccfe3cc7881c42ad903dc23962702c24e7c797071a68a7463b27822a3b77a82fd5ed1c939f12fe4f1ff944c9a436097f96bf2ca00732595236744
-
\Users\Admin\AppData\Local\Temp\d586a3e4da158fcd3843f50b59caeafe208d770922c665bdabed007a9ef83cdcmgr.exe
Filesize155KB
MD560b4a01f8e198b8857f674ca6a809d75
SHA16b9667a5210cf76d730e4305ebc5417187009d2a
SHA2566e9f1ec2429a8bedf6a886d97a22d4fc37cec011f697fd6368d5ebb3b5b01071
SHA512b7045cc893bccfe3cc7881c42ad903dc23962702c24e7c797071a68a7463b27822a3b77a82fd5ed1c939f12fe4f1ff944c9a436097f96bf2ca00732595236744