Analysis
-
max time kernel
90s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 01:01
Static task
static1
Behavioral task
behavioral1
Sample
ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe
Resource
win10v2004-20220901-en
General
-
Target
ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe
-
Size
1.1MB
-
MD5
4a2d67b026ab9d116e067c107381fe76
-
SHA1
57848f53d4aaf6fd0beb7a16d07e819801d0ca17
-
SHA256
ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e
-
SHA512
740aed8cf7c9c9b0928d45cb903ee992e7607d4f60a4e5ac83c78c6012e1ca9313df74a3a99149ef313a959569288861eff276b0d8c3dfc1ffac59d2a49d7fe5
-
SSDEEP
24576:JxGIj5DtzSTPMDZOyu95K2taqpWfrNgPN4pyMSkmQ95cKtg+DWfrNJdNnpyvAf:CANtu1r55tof+jMSk/5PtKfHAvAf
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 1684 cui.exe 4656 cui.tmp 2936 c11w.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2836 wrote to memory of 4796 2836 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe 81 PID 2836 wrote to memory of 4796 2836 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe 81 PID 2836 wrote to memory of 4796 2836 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe 81 PID 4796 wrote to memory of 1684 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 82 PID 4796 wrote to memory of 1684 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 82 PID 4796 wrote to memory of 1684 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 82 PID 1684 wrote to memory of 4656 1684 cui.exe 83 PID 1684 wrote to memory of 4656 1684 cui.exe 83 PID 1684 wrote to memory of 4656 1684 cui.exe 83 PID 4796 wrote to memory of 2936 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 84 PID 4796 wrote to memory of 2936 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 84 PID 4796 wrote to memory of 2936 4796 ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp 84 PID 2936 wrote to memory of 4660 2936 c11w.exe 86 PID 2936 wrote to memory of 4660 2936 c11w.exe 86 PID 2936 wrote to memory of 4660 2936 c11w.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe"C:\Users\Admin\AppData\Local\Temp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\is-GF3OI.tmp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp"C:\Users\Admin\AppData\Local\Temp\is-GF3OI.tmp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp" /SL5="$40040,776043,119296,C:\Users\Admin\AppData\Local\Temp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\is-1U3NO.tmp\cui.exe"C:\Users\Admin\AppData\Local\Temp\is-1U3NO.tmp\cui.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\is-LQ65E.tmp\cui.tmp"C:\Users\Admin\AppData\Local\Temp\is-LQ65E.tmp\cui.tmp" /SL5="$40068,352315,119296,C:\Users\Admin\AppData\Local\Temp\is-1U3NO.tmp\cui.exe"4⤵
- Executes dropped EXE
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\c11w.exe"C:\Users\Admin\AppData\Local\Temp\c11w.exe" -cid=CID -affid=AFFID -sid= -skipifinstalled=1 -delay=0 -ref= -merchantcid= -pubcid= -componentid=200081 -exename="compete.exe" -downloadurl="" -ui=0 -suppress= -ch=0 -enablelog=0 -single_version=1008160629303⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\CScript.exeC:\Windows\system32\CScript.exe C:\Users\Admin\AppData\Local\Temp\hi.vbs //e:vbscript //NOLOGO4⤵PID:4660
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
635KB
MD5b4863478291f9b4a0cdfcf105f5cf51e
SHA16c02820f7eb26e4d68bdfa9819650d8ed799962a
SHA256130166f508e351212e6c5a2283da2a6c564fc273d5aebd30351d7018a3d571a4
SHA512e51dd329ac28db348625fd4743fac11f4a30d143ed6025dbdf53ce7752b230fa84bca4962838934cea99672fe932da468a6a2403c25bda674e497fad700b39f2
-
Filesize
635KB
MD5b4863478291f9b4a0cdfcf105f5cf51e
SHA16c02820f7eb26e4d68bdfa9819650d8ed799962a
SHA256130166f508e351212e6c5a2283da2a6c564fc273d5aebd30351d7018a3d571a4
SHA512e51dd329ac28db348625fd4743fac11f4a30d143ed6025dbdf53ce7752b230fa84bca4962838934cea99672fe932da468a6a2403c25bda674e497fad700b39f2
-
Filesize
582B
MD5e1911b107027b28bcce4c94462521288
SHA1eb47ef9472aaca5ff9772877211233aa2741412b
SHA256cc3f956bab15193c3968dfeeee47a0c477156a311d01fbb04ed6f06602bc6c6d
SHA512f7f5caa42877d73b8a8b49eb9c367c9aa993a0f4508f6ce715e1934b5eb4a616cc672a498ebcde2315c2eabce2952d764605c13c728238c1ae322eb1b51a04fd
-
Filesize
719KB
MD571b8319158c342bb646c965ff5133c89
SHA140ae14bf63908b4d4d90fc3c71c34b8abe0b114a
SHA25618cd28781d5ebf8c7765368338b497ee6d8d68ec9876af6ac0b5c093e5daab52
SHA512b1867d34701c9f2cda848597a3b7132ff14f2bcb47cb084367bb3ba99a1a603be78f2a011433f0a39696c32d5841e7d20ff21c6afcfef3ad4d9766cb2041cebc
-
Filesize
719KB
MD571b8319158c342bb646c965ff5133c89
SHA140ae14bf63908b4d4d90fc3c71c34b8abe0b114a
SHA25618cd28781d5ebf8c7765368338b497ee6d8d68ec9876af6ac0b5c093e5daab52
SHA512b1867d34701c9f2cda848597a3b7132ff14f2bcb47cb084367bb3ba99a1a603be78f2a011433f0a39696c32d5841e7d20ff21c6afcfef3ad4d9766cb2041cebc
-
C:\Users\Admin\AppData\Local\Temp\is-GF3OI.tmp\ad8ee2c662b0b023eb3fcc5a946a2a10573d70e4555793614328e277e4093e3e.tmp
Filesize1.1MB
MD5129b8e200a6e90e813080c9ce0474063
SHA1b5352cdae50e5ddf3eb62f75f2e77042386b8841
SHA256cf0018affdd0b7921f922f1741ad229ec52c8a7d6c2b19889a149e0cc24aa839
SHA51210949e7f0b6dd55e0a5d97e4531ef61427920cccc2136c0dd3607cdc79afa0d8a7178965a07039948da97f0200ead8fe5a54921620c943c7fc76dd5ef5a7c841
-
Filesize
1.1MB
MD5129b8e200a6e90e813080c9ce0474063
SHA1b5352cdae50e5ddf3eb62f75f2e77042386b8841
SHA256cf0018affdd0b7921f922f1741ad229ec52c8a7d6c2b19889a149e0cc24aa839
SHA51210949e7f0b6dd55e0a5d97e4531ef61427920cccc2136c0dd3607cdc79afa0d8a7178965a07039948da97f0200ead8fe5a54921620c943c7fc76dd5ef5a7c841