Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
d8bb5202b2f654fb94483aa02405b8d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d8bb5202b2f654fb94483aa02405b8d5.exe
Resource
win10v2004-20221111-en
General
-
Target
d8bb5202b2f654fb94483aa02405b8d5.exe
-
Size
1.0MB
-
MD5
d8bb5202b2f654fb94483aa02405b8d5
-
SHA1
679077cc9e68d0b9cd5262b86f199b9d52ee8b02
-
SHA256
2fbc173da4e59fa5b1fe4b5c511599c9fc2b20aad0a12c84df2eb48d92ecb975
-
SHA512
8fae4e3053166b1b4f9e451499f7f803989bdfd9825cbb75788ba20c1851c0eadf243c1cf24c88993b5040e48cda6e6e32ae28213a3469be38c57465922ae0fb
-
SSDEEP
24576:NnkxvHQFGuE+nwLLyeoyLDwzQnWOqENeZ7:NkZH6E+wv1/wWW59
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 880 rundll32.exe 5 880 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 880 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
d8bb5202b2f654fb94483aa02405b8d5.exedescription pid process target process PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe PID 936 wrote to memory of 880 936 d8bb5202b2f654fb94483aa02405b8d5.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8bb5202b2f654fb94483aa02405b8d5.exe"C:\Users\Admin\AppData\Local\Temp\d8bb5202b2f654fb94483aa02405b8d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Uayqupoehp.tmp",Rrptfe2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:880
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD5d5e88f35e214f2dff51a7d494316bac2
SHA16306dfa71c4e32dede210631cf90732693c0afcf
SHA256f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4
SHA512ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d
-
Filesize
774KB
MD5d5e88f35e214f2dff51a7d494316bac2
SHA16306dfa71c4e32dede210631cf90732693c0afcf
SHA256f1828a7b26be78bb27df25b98762eb7dd7e49ee8582d5eee42ded05b0eebc1e4
SHA512ff167f0379173f976e3f91f41f6c88e67b12dfb0386b66d19f78d3aa3f11534cf2ce1c1d753ada0133cf291adca7ad8367087b791a5c05eaf371dd877ebcce1d