Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe
Resource
win10v2004-20221111-en
General
-
Target
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe
-
Size
124KB
-
MD5
8cc5f98aa75ce2c7ecb2e0c5e9ac9ae4
-
SHA1
e0af480aa1658aefa628d6c3ebcd18dff9a9d3fb
-
SHA256
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
-
SHA512
8149b1f69148749cc5b514d048e4b53b754d7670389a3d1e94dfdf061c0c35ba00b31e6e4db63d47ab5873c43fb26b0a1484b1317f5fecb7005033519a7081bf
-
SSDEEP
3072:HpAFura95onh8GGrw4BUhCEpzjG7J1yP8:JYXohh+kGFc0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 ~DF37B4.tmp.exe -
Deletes itself 1 IoCs
pid Process 1984 ~DF37B4.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1984 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe 28 PID 2004 wrote to memory of 1984 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe 28 PID 2004 wrote to memory of 1984 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe 28 PID 2004 wrote to memory of 1984 2004 7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe"C:\Users\Admin\AppData\Local\Temp\7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\~DF37B4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\~DF37B4.tmp.exe" QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXDc4MjdkY2FhMjJhNjRmNTdkNzg1MjlkYjA5NzZiMjJjMmI3MzVmNTUwM2RlN2FiYjk4Y2UyMTg1NDhjYTQ5MDEuZXhlAA== 12⤵
- Executes dropped EXE
- Deletes itself
PID:1984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD58cc5f98aa75ce2c7ecb2e0c5e9ac9ae4
SHA1e0af480aa1658aefa628d6c3ebcd18dff9a9d3fb
SHA2567827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
SHA5128149b1f69148749cc5b514d048e4b53b754d7670389a3d1e94dfdf061c0c35ba00b31e6e4db63d47ab5873c43fb26b0a1484b1317f5fecb7005033519a7081bf
-
Filesize
124KB
MD58cc5f98aa75ce2c7ecb2e0c5e9ac9ae4
SHA1e0af480aa1658aefa628d6c3ebcd18dff9a9d3fb
SHA2567827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
SHA5128149b1f69148749cc5b514d048e4b53b754d7670389a3d1e94dfdf061c0c35ba00b31e6e4db63d47ab5873c43fb26b0a1484b1317f5fecb7005033519a7081bf
-
Filesize
124KB
MD58cc5f98aa75ce2c7ecb2e0c5e9ac9ae4
SHA1e0af480aa1658aefa628d6c3ebcd18dff9a9d3fb
SHA2567827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
SHA5128149b1f69148749cc5b514d048e4b53b754d7670389a3d1e94dfdf061c0c35ba00b31e6e4db63d47ab5873c43fb26b0a1484b1317f5fecb7005033519a7081bf