Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:34
Behavioral task
behavioral1
Sample
80750ddfb5cfe9eb8e2adac60f372534.exe
Resource
win7-20220812-en
General
-
Target
80750ddfb5cfe9eb8e2adac60f372534.exe
-
Size
4.8MB
-
MD5
80750ddfb5cfe9eb8e2adac60f372534
-
SHA1
a720efe2b3ef7735efd77de698a5576b36068d07
-
SHA256
876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
-
SHA512
bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
SSDEEP
49152:RAM2vrGxtRJHHc1RmqAhaShRgdGMYYqWxvdTBB0IEqYjla27EdS5g+A:mMgGxtU1RmqA3xsquvPEdZi+A
Malware Config
Extracted
laplas
clipper.guru
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svcupdater.exepid process 4672 svcupdater.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 10 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
80750ddfb5cfe9eb8e2adac60f372534.execmd.exedescription pid process target process PID 952 wrote to memory of 2544 952 80750ddfb5cfe9eb8e2adac60f372534.exe cmd.exe PID 952 wrote to memory of 2544 952 80750ddfb5cfe9eb8e2adac60f372534.exe cmd.exe PID 2544 wrote to memory of 2072 2544 cmd.exe schtasks.exe PID 2544 wrote to memory of 2072 2544 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80750ddfb5cfe9eb8e2adac60f372534.exe"C:\Users\Admin\AppData\Local\Temp\80750ddfb5cfe9eb8e2adac60f372534.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\cmd.execmd.exe "/C schtasks /create /tn \kBqZwNWVQe /tr \"C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"2⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\schtasks.exeschtasks /create /tn \kBqZwNWVQe /tr \"C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe\" /st 00:00 /du 9999:59 /sc once /ri 1 /f"3⤵
- Creates scheduled task(s)
PID:2072
-
-
-
C:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exeC:\Users\Admin\AppData\Roaming\kBqZwNWVQe\svcupdater.exe1⤵
- Executes dropped EXE
PID:4672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f
-
Filesize
4.8MB
MD580750ddfb5cfe9eb8e2adac60f372534
SHA1a720efe2b3ef7735efd77de698a5576b36068d07
SHA256876e6f8cecf5d23d21e11a3a459357c763807614ba7d4ecee9c0537b5936da04
SHA512bf4100fc99282c91ec03c8c234d320321e21e5e4120c45c2cd5cfeaffcf07d4e67143e61407b570448bea16b44ed0bf7ad720e61ca2ae5d30d804c5fc8266d6f