Analysis
-
max time kernel
36s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:18
Static task
static1
Behavioral task
behavioral1
Sample
4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
Resource
win10v2004-20220812-en
General
-
Target
4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
-
Size
715KB
-
MD5
4f4b9e4c37c49ad16f3b118b7ff43bdc
-
SHA1
e0d1b35b3d61fa2835b034dd99446427ad903639
-
SHA256
4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318
-
SHA512
a1e0f19d791a0e7581ff5475ee9948a08fb0376fc15128179c1563486ae9862965bb18cdacd4224eb86dc80f45f877d3f5ede3696eb95efa2cd6910e7701b947
-
SSDEEP
12288:vaYxyeLWtSNrPi37NzHDA6Y1gbl5d7Ifoz4mrNNpRpzqwcQOs0F9FPuIT:vaYxyeLWtkrPi37NzHDA6Yg5dsfoTzhE
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1372 svchost.exe 1000 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe 1724 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1372 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1372 1232 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe 28 PID 1232 wrote to memory of 1372 1232 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe 28 PID 1232 wrote to memory of 1372 1232 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe 28 PID 1232 wrote to memory of 1372 1232 4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe 28 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29 PID 1372 wrote to memory of 1000 1372 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe"3⤵
- Executes dropped EXE
PID:1000
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:1724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
Filesize679KB
MD53910459f67f17a2e1a420895a0d0532a
SHA1241480738e5477cca49f21a3e1e72fced5b68a18
SHA2562bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5
SHA512ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82
-
C:\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
Filesize679KB
MD53910459f67f17a2e1a420895a0d0532a
SHA1241480738e5477cca49f21a3e1e72fced5b68a18
SHA2562bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5
SHA512ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82
-
Filesize
35KB
MD580d44b4af22b51d176921c8f84eb9081
SHA147d74b6306da150a27f548f35d88095722cc55ec
SHA256463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed
SHA51291d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084
-
Filesize
35KB
MD580d44b4af22b51d176921c8f84eb9081
SHA147d74b6306da150a27f548f35d88095722cc55ec
SHA256463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed
SHA51291d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084
-
Filesize
35KB
MD580d44b4af22b51d176921c8f84eb9081
SHA147d74b6306da150a27f548f35d88095722cc55ec
SHA256463da09a6d70720e3a8bebd00e69aa3148985ff23978adbeb7b3895b166e71ed
SHA51291d34d471fcdc545c6dbc94a79e99e6f3ac6f8a05c4ddb7b92c652afdc4262a498a2dd93f181ced2f49a1323fb323691db2ce454c191a121445493ee90834084
-
\Users\Admin\AppData\Local\Temp\4d7788b46f4f2764db50676e83d926fd78979a5d6a29a690c943c62b56326318.exe
Filesize679KB
MD53910459f67f17a2e1a420895a0d0532a
SHA1241480738e5477cca49f21a3e1e72fced5b68a18
SHA2562bc5673cf8e8939015a7a964b96ffd780cba6cdd0b81795e18678921456fc0d5
SHA512ac67a682873431a6a0d53c54941ddbfe44e223615a868ba211d5e95940b3a6eea83b0e5ea46dcf8f80bb1060a3d5e4cad15b0c1ce3c9551c28fd1dcfda523c82