Analysis
-
max time kernel
90s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe
Resource
win7-20220812-en
General
-
Target
8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe
-
Size
196KB
-
MD5
a2707b004c4f1726100faf3835b2cfc2
-
SHA1
6afb62d0508e5792bceed5a2fd4f10a1d77af172
-
SHA256
8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c
-
SHA512
b221b325cb6190d582d3a1f547f7872fc6953a714bb57c722c4d18d12315eabe70bd71e9beb5de13d077a305c96ed27b3444abfed6df6fcb4315e652f6725ced
-
SSDEEP
3072:Vgmn0avOvtYz4nqSioDXx4uE9w2qbMUeZPgrQ/O/46N4M15m:+w0avOvtYSiod4uYzqAvZd/246Tvm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 980 chhlmnxngj -
Loads dropped DLL 2 IoCs
pid Process 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1132 wrote to memory of 980 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe 28 PID 1132 wrote to memory of 980 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe 28 PID 1132 wrote to memory of 980 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe 28 PID 1132 wrote to memory of 980 1132 8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe"C:\Users\Admin\AppData\Local\Temp\8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\users\admin\appdata\local\chhlmnxngj"C:\Users\Admin\AppData\Local\Temp\8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe" a -sc:\users\admin\appdata\local\temp\8aad5f8e4763490ac3883b2082395a5b9104ebf1bcdb14e5c58bdb2ddb29011c.exe2⤵
- Executes dropped EXE
PID:980
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD5afc5697aae7c0f9e1f7ccab6959ce829
SHA140779b44d9c0a4fcace9e7516ba628e2e15ce551
SHA256f7994a303fae2cba32d95d7f55024191eef478fd802d91012cd56f4a3f59ea3a
SHA512a06e0965cf78b68417d1fe59c93f12139ea46f292a8892c5ae7e45a8f5d6e30cae05d04e44b5aa6e509388d9e9edee134e660afcacf7d01eff90ec024c0762ca
-
Filesize
24.0MB
MD5afc5697aae7c0f9e1f7ccab6959ce829
SHA140779b44d9c0a4fcace9e7516ba628e2e15ce551
SHA256f7994a303fae2cba32d95d7f55024191eef478fd802d91012cd56f4a3f59ea3a
SHA512a06e0965cf78b68417d1fe59c93f12139ea46f292a8892c5ae7e45a8f5d6e30cae05d04e44b5aa6e509388d9e9edee134e660afcacf7d01eff90ec024c0762ca
-
Filesize
24.0MB
MD5afc5697aae7c0f9e1f7ccab6959ce829
SHA140779b44d9c0a4fcace9e7516ba628e2e15ce551
SHA256f7994a303fae2cba32d95d7f55024191eef478fd802d91012cd56f4a3f59ea3a
SHA512a06e0965cf78b68417d1fe59c93f12139ea46f292a8892c5ae7e45a8f5d6e30cae05d04e44b5aa6e509388d9e9edee134e660afcacf7d01eff90ec024c0762ca