Analysis
-
max time kernel
166s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe
Resource
win10v2004-20220901-en
General
-
Target
cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe
-
Size
22KB
-
MD5
c8a8f049313d1c67f1baaf338fe5ede0
-
SHA1
bf1caa4b3356715a399a8763e5ff3cc9ab42fb25
-
SHA256
cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe
-
SHA512
8784747f0de0d0ca5e34202242ea7e4ec0df86182c16d0ec399ccca62f043c4c660516ef6b57cff282023a308c75f6bf7c9dc40c6e25199fd4cf05f33d352f15
-
SSDEEP
384:cCnTQbG5J20LgQC0wrDii13hxBRLcVuR5MG1pvSRrtp82xsTTTTqxTTTTTTTT:VMq5cTpVDiUTKuR5BpSRrtp82
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1320 njsou.exe -
Deletes itself 1 IoCs
pid Process 1320 njsou.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1320 1712 cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe 27 PID 1712 wrote to memory of 1320 1712 cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe 27 PID 1712 wrote to memory of 1320 1712 cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe 27 PID 1712 wrote to memory of 1320 1712 cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe"C:\Users\Admin\AppData\Local\Temp\cf7454645f1116d370dcc1ea979bb31866600c15880f69920ba65cdf941d6ffe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\njsou.exeC:\Users\Admin\AppData\Local\Temp\njsou.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD596ea95d266c46702f0647d31ce7fe93f
SHA1fa798dfce6db31d20d903bc34cecf815684b62c5
SHA256c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1
SHA512f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436
-
Filesize
22KB
MD596ea95d266c46702f0647d31ce7fe93f
SHA1fa798dfce6db31d20d903bc34cecf815684b62c5
SHA256c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1
SHA512f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436
-
Filesize
22KB
MD596ea95d266c46702f0647d31ce7fe93f
SHA1fa798dfce6db31d20d903bc34cecf815684b62c5
SHA256c906f4992315925a2a2b7dbfc7b54ce02a4099d5ae11b12be012f48a3e4f6ba1
SHA512f7fb935874b91410c48aa1e566dbd8084493abebac4842dd1499a167574d5e400c276933fe830c0bb7c283fc2bd0489f935585f44ae74ae8aeed8d8ab5a2c436