Analysis
-
max time kernel
95s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 09:33
Static task
static1
Behavioral task
behavioral1
Sample
adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe
Resource
win10v2004-20221111-en
General
-
Target
adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe
-
Size
7.0MB
-
MD5
4ce3ce888b2db98296b84bc954482398
-
SHA1
cd5a2cfe8150bc391b52a614c317e6dc6c786b72
-
SHA256
adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17
-
SHA512
ed50ab3a098fc8170cc5ee1c6ddcef93582749661203c8b6ef9a13e9a6be533281f4441f52b9696309e7816cbb572d7eedc59cb7b2ba959b5aec37f86e26e9ea
-
SSDEEP
98304:7q5SvxVXQoWI/xedQtCFz501eP0LNhR5Kb3NhR5KbBPcn6:NgnI/cUCFz+9LNQ3NQBPcn6
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1364-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-79-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-81-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-87-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-85-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-93-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-95-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-91-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-56-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-98-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1364-103-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ESPI11.dll adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe File opened for modification C:\Windows\SysWOW64\ESPI11.dll adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1364 wrote to memory of 296 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 28 PID 1364 wrote to memory of 296 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 28 PID 1364 wrote to memory of 296 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 28 PID 1364 wrote to memory of 296 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 28 PID 1364 wrote to memory of 1536 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 30 PID 1364 wrote to memory of 1536 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 30 PID 1364 wrote to memory of 1536 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 30 PID 1364 wrote to memory of 1536 1364 adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe 30 PID 296 wrote to memory of 1580 296 net.exe 32 PID 296 wrote to memory of 1580 296 net.exe 32 PID 296 wrote to memory of 1580 296 net.exe 32 PID 296 wrote to memory of 1580 296 net.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe"C:\Users\Admin\AppData\Local\Temp\adf0844b1a8e29d390fca7364cf35b9a33b41546b13f0341a71c7cda4d3b1c17.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\net.exenet start sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start sharedaccess3⤵PID:1580
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh winsock reset2⤵PID:1536
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5b4c2caaa15d4e505ad2858ab15eafb58
SHA1a1c30a4d016f1c6bd3bf50e36767af8af166d59b
SHA25693e03eadd330242f2394c15cd32857194e5b80f6300835ef77f8558ca70a2ef1
SHA51209b5903a579685522a521cec3b6026ab0d7b9cff3099f032254dbd2b48fbbdd9a7411c0765049784c64f520d41916e681cae206a736b4fab1868f449e84b4bf2