Analysis
-
max time kernel
403s -
max time network
456s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe
Resource
win10v2004-20221111-en
General
-
Target
f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe
-
Size
3.3MB
-
MD5
1c4b3684c5dd11a1a462a9516f90f05e
-
SHA1
39805472d2f5b72b57fdd7385d097e0a368de3cd
-
SHA256
f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6
-
SHA512
c6da7bb30cff49be9f18ec9fcc9708316d1ee467d8be3a616745bc80bfaaf2ce894face06149c7e086e5671d640c25c6cd46b31e2bc8cc11e0059b8f1e1fec27
-
SSDEEP
98304:T3YobVRxj94j/JpY6A7PFLiWg5RxjUZzJ:7YeujnY6aIrYZ9
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
drvprosetup.exedrvprosetup.tmppid process 1132 drvprosetup.exe 2596 drvprosetup.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exedrvprosetup.exedescription pid process target process PID 1944 wrote to memory of 1132 1944 f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe drvprosetup.exe PID 1944 wrote to memory of 1132 1944 f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe drvprosetup.exe PID 1944 wrote to memory of 1132 1944 f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe drvprosetup.exe PID 1132 wrote to memory of 2596 1132 drvprosetup.exe drvprosetup.tmp PID 1132 wrote to memory of 2596 1132 drvprosetup.exe drvprosetup.tmp PID 1132 wrote to memory of 2596 1132 drvprosetup.exe drvprosetup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe"C:\Users\Admin\AppData\Local\Temp\f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\drvprosetup.exeC:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp" /SL5="$120028,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:2596
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb