Analysis
-
max time kernel
379s -
max time network
449s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 14:33
Static task
static1
Behavioral task
behavioral1
Sample
9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe
Resource
win10v2004-20221111-en
General
-
Target
9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe
-
Size
3.3MB
-
MD5
e8231bacbb28664f17be611e0ed865d4
-
SHA1
8794e939f3eeaeae58914b65588b6552cd486941
-
SHA256
9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095
-
SHA512
69465604b9eaaea38e1b960255744fa0c28a5592f38198c68b2d21555f9f33c3459eeeb54451d4606e5455e07e6a9964eeedb18e44f4663f8fe36467a82dbd6d
-
SSDEEP
98304:N3YobVRxj94j/JpY6A7PFLiWg5RxjUZzu:hYeujnY6aIrYZS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
drvprosetup.exedrvprosetup.tmppid process 612 drvprosetup.exe 4500 drvprosetup.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exedrvprosetup.exedescription pid process target process PID 3076 wrote to memory of 612 3076 9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe drvprosetup.exe PID 3076 wrote to memory of 612 3076 9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe drvprosetup.exe PID 3076 wrote to memory of 612 3076 9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe drvprosetup.exe PID 612 wrote to memory of 4500 612 drvprosetup.exe drvprosetup.tmp PID 612 wrote to memory of 4500 612 drvprosetup.exe drvprosetup.tmp PID 612 wrote to memory of 4500 612 drvprosetup.exe drvprosetup.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe"C:\Users\Admin\AppData\Local\Temp\9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\drvprosetup.exeC:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp" /SL5="$E0066,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:4500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
2.9MB
MD520a1ff6efbfc6d83a0a6008f45914e9e
SHA1c3bda8bb56403824402e825ec2c7e022e7d31c13
SHA256508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828
SHA5124b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb
-
Filesize
1.1MB
MD5938604f6ac59637bac93477c279247b2
SHA17d463ead499fb69ee4d785429ba8783b5bbef43a
SHA25638a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3
SHA5122e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb