Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 03:52

General

  • Target

    1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710.exe

  • Size

    643KB

  • MD5

    18a5805528c6b4e684a4817ec528eead

  • SHA1

    c7bdad25a422baa26b43ad4169c62c15af7d1fdb

  • SHA256

    1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710

  • SHA512

    c6b91b0c22a153edca16861bc27b46c2b6cb28090bdcabadab7d901c9ecc1d819185fecbaf4f3e294147d772372655782c2f73194f27f4b61b7e8c1c6d18317a

  • SSDEEP

    12288:miyU0BFtvsPUkGXgDkmBxAJmKVg8zThh6XQ1HoOUAWfTq3N:UVXtyLGwDJkJxVVzXIIHokWfTq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710.exe
    "C:\Users\Admin\AppData\Local\Temp\1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:584
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\RAV2007.BAT
      2⤵
      • Deletes itself
      PID:1956
  • C:\Windows\SysWOW64\svhest.exe
    C:\Windows\SysWOW64\svhest.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:1788

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\RAV2007.BAT

    Filesize

    254B

    MD5

    d94864eabb78275be904ddb4a4607c49

    SHA1

    776020a48074d3b4fb28d3b81aa74d43a505dacc

    SHA256

    55b6823b951a823d3d7f05f76b8ad904df37ecf6be1355c1060ced7bc37d57b2

    SHA512

    89e9bdc768287508232e1866cdf94f75fe8c7eb860b2c13486f2cbac7624d9bee869de6f78ff1be5e4ec6bc5f5638aae5f5bb7b3fdce410577a6bd2d570b1156

  • C:\Windows\SysWOW64\svhest.exe

    Filesize

    643KB

    MD5

    18a5805528c6b4e684a4817ec528eead

    SHA1

    c7bdad25a422baa26b43ad4169c62c15af7d1fdb

    SHA256

    1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710

    SHA512

    c6b91b0c22a153edca16861bc27b46c2b6cb28090bdcabadab7d901c9ecc1d819185fecbaf4f3e294147d772372655782c2f73194f27f4b61b7e8c1c6d18317a

  • C:\Windows\SysWOW64\svhest.exe

    Filesize

    643KB

    MD5

    18a5805528c6b4e684a4817ec528eead

    SHA1

    c7bdad25a422baa26b43ad4169c62c15af7d1fdb

    SHA256

    1a3e0de303aa19ac6c32c96108727a5e81bf57bc373ebb7de694cd8f432df710

    SHA512

    c6b91b0c22a153edca16861bc27b46c2b6cb28090bdcabadab7d901c9ecc1d819185fecbaf4f3e294147d772372655782c2f73194f27f4b61b7e8c1c6d18317a

  • memory/1956-56-0x0000000000000000-mapping.dmp