Analysis
-
max time kernel
63s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:40
Behavioral task
behavioral1
Sample
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
17 signatures
150 seconds
General
-
Target
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe
-
Size
754KB
-
MD5
b75f4b6f92fde130c694f264d4c8d403
-
SHA1
c0dd0dbcf20f3e85a7a00c4376b624f90ded9361
-
SHA256
e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914
-
SHA512
d4711f7dcfecd1cfd67a4a35c7ab6b7a6fe19d921257d0722f25f535dd7693164ab33db9d9693b3c4ab7e747d6c2dad95f61fe702ab669e170968743d3c94ef2
-
SSDEEP
12288:iplHTKI+LJ6knFQ8LckSl4PDVMfpoLqLWvItSesv6+G:YBaJ6G/LckSl4PDKf3LCW86+G
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
resource yara_rule behavioral1/memory/840-55-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral1/memory/840-56-0x0000000000400000-0x000000000059A000-memory.dmp upx behavioral1/memory/840-59-0x0000000000400000-0x000000000059A000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\DNomb\Mpec.mbt e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe File opened for modification C:\Windows\DNomb\Mpec.mbt e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 1856 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 31 PID 840 wrote to memory of 1856 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 31 PID 840 wrote to memory of 1856 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 31 PID 840 wrote to memory of 1856 840 e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe"C:\Users\Admin\AppData\Local\Temp\e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.execmd.exe /c del e2de578cc207a0866c80c889c53aa94358a7bb07418b9731c3f94a564eb7d914.exe2⤵
- Deletes itself
PID:1856
-