Analysis
-
max time kernel
25s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe
Resource
win10v2004-20220812-en
General
-
Target
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe
-
Size
222KB
-
MD5
35f7d4f2f4dfb140a23757fb925ea2a6
-
SHA1
40d6ec04f746d5a7b7ee8dd6d9037c347816fcb9
-
SHA256
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886
-
SHA512
0edea5be82495a2c0448371bd54a29d97e497bdace173d3f9dcbd9c9590cfed1cc91568902aeb1ec746bca651d6032062b98decc85077338904bb7cc5f83eb02
-
SSDEEP
6144:c+Hhq+W05MCRGJ/HHojq5cA6jZ622EzP3F:795HGJfImD61F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exepid process 796 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe -
Processes:
resource yara_rule behavioral1/memory/796-61-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exepid process 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 796 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe 796 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exedescription pid process target process PID 1192 wrote to memory of 796 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe PID 1192 wrote to memory of 796 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe PID 1192 wrote to memory of 796 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe PID 1192 wrote to memory of 796 1192 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe 1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe"C:\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exeC:\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:796 -
C:\Users\Admin\AppData\Local\Temp\qypdwdum.exeC:\Users\Admin\AppData\Local\Temp\qypdwdum.exe3⤵PID:876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe
Filesize176KB
MD53aae7ee64e5e23915c4fce31d7e30aa9
SHA1e423085ea6af5e762c1ebd5093ce1c27c2fc4f1a
SHA256d98fe769f58ca1d1f7d582e16a22f15c3488184b5cdf7a6cecc888efc456809d
SHA512ffe31a5a840f380502a6124df2a09890cc1b8d881ebe1cbe414940249ed27648b76631134e189a8c85d4b86d992586da10e61ffc8414138c33f77bd272952038
-
\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe
Filesize176KB
MD53aae7ee64e5e23915c4fce31d7e30aa9
SHA1e423085ea6af5e762c1ebd5093ce1c27c2fc4f1a
SHA256d98fe769f58ca1d1f7d582e16a22f15c3488184b5cdf7a6cecc888efc456809d
SHA512ffe31a5a840f380502a6124df2a09890cc1b8d881ebe1cbe414940249ed27648b76631134e189a8c85d4b86d992586da10e61ffc8414138c33f77bd272952038
-
\Users\Admin\AppData\Local\Temp\1bf84898c3bfc143a6c7f56a9addf1be625dce1c452978f119b862d192992886mgr.exe
Filesize176KB
MD53aae7ee64e5e23915c4fce31d7e30aa9
SHA1e423085ea6af5e762c1ebd5093ce1c27c2fc4f1a
SHA256d98fe769f58ca1d1f7d582e16a22f15c3488184b5cdf7a6cecc888efc456809d
SHA512ffe31a5a840f380502a6124df2a09890cc1b8d881ebe1cbe414940249ed27648b76631134e189a8c85d4b86d992586da10e61ffc8414138c33f77bd272952038
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94