Analysis
-
max time kernel
240s -
max time network
334s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 08:11
Static task
static1
Behavioral task
behavioral1
Sample
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe
Resource
win10v2004-20221111-en
General
-
Target
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe
-
Size
14.5MB
-
MD5
adf868ff31ada8fb91fbf736d5863744
-
SHA1
d96855040107511d0b2deba6322235dd8763478a
-
SHA256
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9
-
SHA512
c19abfb290811f608c1e46e024f6f680eb2e6e35b81058912d42800348d96723e11cb363837304463bf6f263378d2046041252910f93156fd5c534ae6c413047
-
SSDEEP
196608:vCUAKTfku7itp9y3RdbT5uNYvrsIsRXMxLCnnhbdjRHD2CC3s+/Gbu0T67gSa4QA:9i8l8NUrxwnt7FqOU3QAZUboDo27gdR8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmppid process 1688 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp -
Loads dropped DLL 4 IoCs
Processes:
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exedb3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmppid process 1872 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe 1688 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp 1688 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp 1688 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmppid process 1688 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exedescription pid process target process PID 1872 wrote to memory of 1688 1872 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp PID 1872 wrote to memory of 1688 1872 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp PID 1872 wrote to memory of 1688 1872 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp PID 1872 wrote to memory of 1688 1872 db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe"C:\Users\Admin\AppData\Local\Temp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\is-C0685.tmp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp"C:\Users\Admin\AppData\Local\Temp\is-C0685.tmp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp" /SL5="$80124,14955877,56832,C:\Users\Admin\AppData\Local\Temp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-C0685.tmp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp
Filesize702KB
MD5e470dc0989b8713ea215450228e0c714
SHA1f2df3fd29919421a9f55f471d9fa70aea3751f59
SHA256838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635
SHA512822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-C0685.tmp\db3aa30c3e5522aee17700921d731b26296beb35d7c96cfedb96b9b599e2e8e9.tmp
Filesize702KB
MD5e470dc0989b8713ea215450228e0c714
SHA1f2df3fd29919421a9f55f471d9fa70aea3751f59
SHA256838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635
SHA512822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7