Analysis
-
max time kernel
254s -
max time network
285s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 01:56
Static task
static1
Behavioral task
behavioral1
Sample
49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe
Resource
win10v2004-20221111-en
General
-
Target
49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe
-
Size
2.5MB
-
MD5
4ae76d80154dcb97d4ac61e22d3c9ef6
-
SHA1
d2c117e9dd6e30acb3b4c28eba60f9ee1c5d5e9b
-
SHA256
49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732
-
SHA512
f85f357b7b02e7e047656752ccba2fc1e158dd5687f3a1ff7f89d64997abbd7b21008d099a69bd36fb6e978a79e2c098f3560a6c28e2a859965b35ed796364b0
-
SSDEEP
49152:h1Os/PHVmVhYwiLtKkKyW4nFU0I+NP/f7I3lMOaYjdxvL0HT:h1OoHVl71RnFXINxv0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
zWX3CbC7Ol7r1tC.exepid process 3260 zWX3CbC7Ol7r1tC.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exedescription pid process target process PID 3360 wrote to memory of 3260 3360 49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe zWX3CbC7Ol7r1tC.exe PID 3360 wrote to memory of 3260 3360 49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe zWX3CbC7Ol7r1tC.exe PID 3360 wrote to memory of 3260 3360 49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe zWX3CbC7Ol7r1tC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe"C:\Users\Admin\AppData\Local\Temp\49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\7zS5D6D.tmp\zWX3CbC7Ol7r1tC.exe.\zWX3CbC7Ol7r1tC.exe2⤵
- Executes dropped EXE
PID:3260
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5bd8b572b5a1e023ce33bc2ecf5888a94
SHA195038623d23412a3f2a0b08d3ff0816022ba8cf6
SHA256d5ea3898a3be8737db69917793012b390ee18e00bcb91d45c010f9ea7d276379
SHA512412d1b94975713e3b1d0441a5022045dd3598dfb421d4a2345bef7fd76cb0f39850ba1c937f03ddca636f7ed075ecc00ae3c45046b3ff65b2e0d2a018ceea51f
-
Filesize
760KB
MD5dcd148f6f3af3e3b0935c4fcc9f41811
SHA1ee9bdbc7c568c7832d90b85921ab20030b6734cd
SHA256f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4
SHA51234be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886
-
Filesize
760KB
MD5dcd148f6f3af3e3b0935c4fcc9f41811
SHA1ee9bdbc7c568c7832d90b85921ab20030b6734cd
SHA256f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4
SHA51234be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886