Analysis
-
max time kernel
362s -
max time network
420s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe
Resource
win10v2004-20221111-en
General
-
Target
f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe
-
Size
3.3MB
-
MD5
d51d2ae27240253d256eb407146b0b95
-
SHA1
4ef90358186ff8c336b9cba939518bcb79a8c22f
-
SHA256
f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1
-
SHA512
9dbe71eba2605f3cecbb49767121843c13070ebe3d08b71855efb12a108c0637a5a21b8f3454f48789d99727e8ed28856ccc3f4da75d3c0c0b726994ddce2add
-
SSDEEP
98304:33YobVRxj94j/JpY6A7PFLiWg5RxjUZzc:nYeujnY6aIrYZY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
drvprosetup.exedrvprosetup.tmppid process 4156 drvprosetup.exe 1608 drvprosetup.tmp -
Drops file in Program Files directory 8 IoCs
Processes:
drvprosetup.tmpdescription ioc process File opened for modification C:\Program Files (x86)\Driver Pro\DPTray.exe drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\sqlite3.dll drvprosetup.tmp File created C:\Program Files (x86)\Driver Pro\unins000.dat drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\DPStartScan.exe drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\DriverPro.chm drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\7z.dll drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\DriverPro.exe drvprosetup.tmp File opened for modification C:\Program Files (x86)\Driver Pro\DrvProHelper.dll drvprosetup.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
drvprosetup.tmppid process 1608 drvprosetup.tmp 1608 drvprosetup.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exedrvprosetup.exedescription pid process target process PID 1800 wrote to memory of 4156 1800 f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe drvprosetup.exe PID 1800 wrote to memory of 4156 1800 f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe drvprosetup.exe PID 1800 wrote to memory of 4156 1800 f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe drvprosetup.exe PID 4156 wrote to memory of 1608 4156 drvprosetup.exe drvprosetup.tmp PID 4156 wrote to memory of 1608 4156 drvprosetup.exe drvprosetup.tmp PID 4156 wrote to memory of 1608 4156 drvprosetup.exe drvprosetup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe"C:\Users\Admin\AppData\Local\Temp\f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\drvprosetup.exeC:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp" /SL5="$C006C,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1608
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb