Analysis
-
max time kernel
139s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 06:10
Static task
static1
Behavioral task
behavioral1
Sample
6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe
Resource
win7-20221111-en
General
-
Target
6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe
-
Size
96KB
-
MD5
fe46056fc8bd9d648a29e076650a2bdf
-
SHA1
d8e087bf82884fd900fa6bab3019e73cf7ebf213
-
SHA256
6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1
-
SHA512
1ea0fa142d386e2007b57c0335b18be583b624aebee187e86102d943c65631977c8c26fb02ef8c248445d6166bb0939edaaa4b579d1a1f15a50a9e8c9a017d4b
-
SSDEEP
3072:iOS4jHS8q/3nTzePCwNUh4E90yp9w7RUTV/LUz:ih428q/nTzePCwG70ywSS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dicpodhhqopid process 528 dicpodhhqo -
Deletes itself 1 IoCs
Processes:
dicpodhhqopid process 528 dicpodhhqo -
Loads dropped DLL 2 IoCs
Processes:
6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exepid process 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dicpodhhqopid process 528 dicpodhhqo -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exedescription pid process target process PID 2036 wrote to memory of 528 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe dicpodhhqo PID 2036 wrote to memory of 528 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe dicpodhhqo PID 2036 wrote to memory of 528 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe dicpodhhqo PID 2036 wrote to memory of 528 2036 6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe dicpodhhqo
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe"C:\Users\Admin\AppData\Local\Temp\6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
\??\c:\users\admin\appdata\local\dicpodhhqo"C:\Users\Admin\AppData\Local\Temp\6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe" a -sc:\users\admin\appdata\local\temp\6c7a4c2eb323324b2591e838c5b3391c28828d8466a138533aff7bbf123fdbd1.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\dicpodhhqoFilesize
21.6MB
MD591518f31f63f7894afc0f6d5a02640cc
SHA11343029f6280a0d9b1366826a8cc3903100cfc03
SHA256e4d15e73c42a52856b2f3def1b7cd08295afb7744619cd70cc1420b237fdd0fd
SHA51227cc27dbb6239f6b50c90bfb3d0b48b970712d19e1809db66b585eb7d044550df3dbae267970bf3971b264ee485d5088fa59a0af2164c470f1cf96bf70a15a5a
-
\Users\Admin\AppData\Local\dicpodhhqoFilesize
21.6MB
MD591518f31f63f7894afc0f6d5a02640cc
SHA11343029f6280a0d9b1366826a8cc3903100cfc03
SHA256e4d15e73c42a52856b2f3def1b7cd08295afb7744619cd70cc1420b237fdd0fd
SHA51227cc27dbb6239f6b50c90bfb3d0b48b970712d19e1809db66b585eb7d044550df3dbae267970bf3971b264ee485d5088fa59a0af2164c470f1cf96bf70a15a5a
-
\Users\Admin\AppData\Local\dicpodhhqoFilesize
21.6MB
MD591518f31f63f7894afc0f6d5a02640cc
SHA11343029f6280a0d9b1366826a8cc3903100cfc03
SHA256e4d15e73c42a52856b2f3def1b7cd08295afb7744619cd70cc1420b237fdd0fd
SHA51227cc27dbb6239f6b50c90bfb3d0b48b970712d19e1809db66b585eb7d044550df3dbae267970bf3971b264ee485d5088fa59a0af2164c470f1cf96bf70a15a5a
-
memory/528-58-0x0000000000000000-mapping.dmp
-
memory/528-60-0x0000000000400000-0x000000000044E29C-memory.dmpFilesize
312KB
-
memory/528-61-0x0000000000400000-0x000000000044E29C-memory.dmpFilesize
312KB
-
memory/2036-54-0x0000000000400000-0x000000000044E29C-memory.dmpFilesize
312KB
-
memory/2036-55-0x0000000000400000-0x000000000044E29C-memory.dmpFilesize
312KB