Analysis
-
max time kernel
129s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe
Resource
win7-20221111-en
General
-
Target
20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe
-
Size
830KB
-
MD5
9640eccfd30d456c8013219d0fef5922
-
SHA1
6cf2f6a1eade4334df67c6889c831b1971669e67
-
SHA256
20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546
-
SHA512
a0cf9fa410041eff21054b0124eded4591e954c9e191114b9838a46387cf36506b4aa9532800b7ba312c536f8fe45bdbe9bf6b8f2f4dc96a7a4e37d6097f8008
-
SSDEEP
12288:76tERgNg5unckhtpDKZczPrlh+Sl4qyBe/Sn4txi2:7Fu7MCRPa98/aj2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 940 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe -
resource yara_rule behavioral1/memory/940-63-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 940 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 940 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1328 940 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 520 AUDIODG.EXE Token: 33 520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 520 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1812 wrote to memory of 940 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 28 PID 1812 wrote to memory of 940 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 28 PID 1812 wrote to memory of 940 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 28 PID 1812 wrote to memory of 940 1812 20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe"C:\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exeC:\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 1803⤵
- Program crash
PID:1328
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5281⤵
- Suspicious use of AdjustPrivilegeToken
PID:520
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe
Filesize354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe
Filesize354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
\Users\Admin\AppData\Local\Temp\20e6166b228b6d65536f4689521c14da5676d49bd47b378d581081220cecc546mgr.exe
Filesize354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94