Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:53
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
10KB
-
MD5
d8ecc1fd1deb6c69a39bbae5c2c4e528
-
SHA1
9abce16698a70cf118a251a00ba550122ad31102
-
SHA256
4b56d0b0c8c52803bf7c21587bd98a16f73f0d6ed4e4153eee1964533ac394ee
-
SHA512
7c00e5d84b5e6b5b8ac4e9bd1b1490db6cb1888c48f74946cc218954a1be30030360dc1fad35d7cd8e6909c58a0d201111ef8dc5416462378646c8bebc218ab7
-
SSDEEP
192:V8WNyBKkeqbOABDNDZP1oynVeMLkWS+E/Q+VIKiIidEiv:lNyxeqFBl1XeMQWS+E/Q+VXiWiv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 424 winsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winsvc.exe" tmp.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winsvc.exe tmp.exe File opened for modification C:\Windows\winsvc.exe tmp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2608 wrote to memory of 424 2608 tmp.exe 80 PID 2608 wrote to memory of 424 2608 tmp.exe 80 PID 2608 wrote to memory of 424 2608 tmp.exe 80
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5d8ecc1fd1deb6c69a39bbae5c2c4e528
SHA19abce16698a70cf118a251a00ba550122ad31102
SHA2564b56d0b0c8c52803bf7c21587bd98a16f73f0d6ed4e4153eee1964533ac394ee
SHA5127c00e5d84b5e6b5b8ac4e9bd1b1490db6cb1888c48f74946cc218954a1be30030360dc1fad35d7cd8e6909c58a0d201111ef8dc5416462378646c8bebc218ab7
-
Filesize
10KB
MD5d8ecc1fd1deb6c69a39bbae5c2c4e528
SHA19abce16698a70cf118a251a00ba550122ad31102
SHA2564b56d0b0c8c52803bf7c21587bd98a16f73f0d6ed4e4153eee1964533ac394ee
SHA5127c00e5d84b5e6b5b8ac4e9bd1b1490db6cb1888c48f74946cc218954a1be30030360dc1fad35d7cd8e6909c58a0d201111ef8dc5416462378646c8bebc218ab7