Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:38
Static task
static1
Behavioral task
behavioral1
Sample
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe
Resource
win10v2004-20220812-en
General
-
Target
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe
-
Size
76KB
-
MD5
cae7bc7cfe443787a6a4989116af16da
-
SHA1
b21e8a3a07b955b5288617b8aecdb187900a50fc
-
SHA256
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390
-
SHA512
6b5353399822f6c95705978e14b3fa8857fd95f10adce4d6cd9ec91698cecbbf80acd95d8717007102c50680292cf05621c100c880301bd1d8fd96a9336bba6b
-
SSDEEP
1536:9jXScjxJITFYCJDgd+w3/6DS68f/uPqFqEw:9WcFoYeI+wSS62/uPUqEw
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dtkevthv = "\"C:\\Users\\Admin\\AppData\\Local\\fpmpqfcn.exe\"" svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exepid process 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exedescription pid process target process PID 1032 wrote to memory of 1224 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe svchost.exe PID 1032 wrote to memory of 1224 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe svchost.exe PID 1032 wrote to memory of 1224 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe svchost.exe PID 1032 wrote to memory of 1224 1032 30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe"C:\Users\Admin\AppData\Local\Temp\30ccf616ac823878ec33c5fe9c59389c6690ffbf6e7d8ee3af63fc2110e4b390.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1032-56-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/1224-54-0x0000000000000000-mapping.dmp
-
memory/1224-55-0x0000000076711000-0x0000000076713000-memory.dmpFilesize
8KB
-
memory/1224-57-0x0000000000D70000-0x0000000000D78000-memory.dmpFilesize
32KB
-
memory/1224-58-0x0000000000080000-0x0000000000091000-memory.dmpFilesize
68KB
-
memory/1224-59-0x0000000000190000-0x0000000000210000-memory.dmpFilesize
512KB