Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:13
Static task
static1
Behavioral task
behavioral1
Sample
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe
Resource
win10v2004-20220901-en
General
-
Target
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe
-
Size
135KB
-
MD5
44cbc1ed36cb339c49d4131375e74060
-
SHA1
995760e4b37878dbe496219a48b1f1e073468159
-
SHA256
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d
-
SHA512
a8d82c8abfec9cc5a19196f0af1da94e6399d3e53882ef1f8b6ca0d9e9af721e4f32da99b9b335073088423d2f06f3dffc628dc9c5ca7b88c53d6709ae999b33
-
SSDEEP
3072:XY8VKtX8vUYyKGpPLi66H50nmNJQIaK8juK2cma/rM1aout:XhSyxuzi66HOeJZatjuZcmapoS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
msprxysvc32.exepid process 1992 msprxysvc32.exe -
Deletes itself 1 IoCs
Processes:
msprxysvc32.exepid process 1992 msprxysvc32.exe -
Loads dropped DLL 2 IoCs
Processes:
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exepid process 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe -
Drops file in System32 directory 4 IoCs
Processes:
msprxysvc32.exe5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exedescription ioc process File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe File created C:\Windows\SysWOW64\msprxysvc32.exe msprxysvc32.exe File created C:\Windows\SysWOW64\msprxysvc32.exe 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe File opened for modification C:\Windows\SysWOW64\msprxysvc32.exe 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exemsprxysvc32.exedescription pid process target process PID 2004 wrote to memory of 1992 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe msprxysvc32.exe PID 2004 wrote to memory of 1992 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe msprxysvc32.exe PID 2004 wrote to memory of 1992 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe msprxysvc32.exe PID 2004 wrote to memory of 1992 2004 5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe msprxysvc32.exe PID 1992 wrote to memory of 1492 1992 msprxysvc32.exe cmd.exe PID 1992 wrote to memory of 1492 1992 msprxysvc32.exe cmd.exe PID 1992 wrote to memory of 1492 1992 msprxysvc32.exe cmd.exe PID 1992 wrote to memory of 1492 1992 msprxysvc32.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe"C:\Users\Admin\AppData\Local\Temp\5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\msprxysvc32.exeC:\Windows\system32\msprxysvc32.exe 468 "C:\Users\Admin\AppData\Local\Temp\5d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\msprxysvc32.exe3⤵PID:1492
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bfcf9cc6d1c37953dfa43312e2c36140
SHA107a4c0f29b282c34be24c312c4b920e479f4cee0
SHA256bac7cce52aeba3a2e2ce2bb6aebf50ffa65530d0d51ca49a2abc7f4e43ce3ce5
SHA512fb661474557e7168d4050607863b57649fa12a26ab9bd06078ae3254d003d76cfed4eac3d0a78a56eaf0ecc5b231d52788b6c8688cb14b0c86a37efe90f5f53a
-
Filesize
135KB
MD544cbc1ed36cb339c49d4131375e74060
SHA1995760e4b37878dbe496219a48b1f1e073468159
SHA2565d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d
SHA512a8d82c8abfec9cc5a19196f0af1da94e6399d3e53882ef1f8b6ca0d9e9af721e4f32da99b9b335073088423d2f06f3dffc628dc9c5ca7b88c53d6709ae999b33
-
Filesize
135KB
MD544cbc1ed36cb339c49d4131375e74060
SHA1995760e4b37878dbe496219a48b1f1e073468159
SHA2565d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d
SHA512a8d82c8abfec9cc5a19196f0af1da94e6399d3e53882ef1f8b6ca0d9e9af721e4f32da99b9b335073088423d2f06f3dffc628dc9c5ca7b88c53d6709ae999b33
-
Filesize
135KB
MD544cbc1ed36cb339c49d4131375e74060
SHA1995760e4b37878dbe496219a48b1f1e073468159
SHA2565d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d
SHA512a8d82c8abfec9cc5a19196f0af1da94e6399d3e53882ef1f8b6ca0d9e9af721e4f32da99b9b335073088423d2f06f3dffc628dc9c5ca7b88c53d6709ae999b33
-
Filesize
135KB
MD544cbc1ed36cb339c49d4131375e74060
SHA1995760e4b37878dbe496219a48b1f1e073468159
SHA2565d90d58a2bcafed9f24d6af70b74f55dc08db3d6efac0a002c05038b19d52f4d
SHA512a8d82c8abfec9cc5a19196f0af1da94e6399d3e53882ef1f8b6ca0d9e9af721e4f32da99b9b335073088423d2f06f3dffc628dc9c5ca7b88c53d6709ae999b33