Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:08
Behavioral task
behavioral1
Sample
6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe
Resource
win10v2004-20220812-en
General
-
Target
6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe
-
Size
108KB
-
MD5
1f81e472aa6d1d02c436be6486533b83
-
SHA1
438e39892c890c850c96ad81577fbba294366520
-
SHA256
6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687
-
SHA512
b94acfdfd6270e53d0057614328e5e5020f04c474410ac5f9cfcb13d2efb28572821717ad115fdc8f8846915f5a2a0c3f9b55485e25538cee473dbe1c7e6c902
-
SSDEEP
3072:ON0LwH/hUmnWtmp5dS98Cy/KXiBmv6YqhFnaiw:ONxP8I0gKXiBovqhFat
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.~01 -
resource yara_rule behavioral2/memory/4772-136-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral2/memory/4772-138-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SYSLIB32.DLL 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File created C:\PROGRAM FILES\7-ZIP\7ZG.BCP 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.AGL 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File created C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.QBM 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.QBM 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File created C:\PROGRAM FILES\7-ZIP\7Z.RAK 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.RAK 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVSHNOTIFY.EXE 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File created C:\PROGRAM FILES\7-ZIP\7ZFM.TNM 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.EXE 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File created C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\APPVCLEANER.AGL 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.TNM 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.BCP 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4556 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe 80 PID 4772 wrote to memory of 4556 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe 80 PID 4772 wrote to memory of 4556 4772 6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe"C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.~01C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.~012⤵
- Executes dropped EXE
PID:4556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.~01
Filesize75KB
MD5df2cbe2f92e64a6a8772900242c1a3b9
SHA13b5ca55a52adf2885bca7114ff60b4b0c45024ab
SHA2562f14ac1ebc2a5e41e59f142c6854fb66b3fceb87c5a7b1367b368fece06c5672
SHA512e6831a3b6ab35e990e1078b013fc4ebe6513d64cd75a30d023aa1610d65cff67497a12a9a4b8495b8cca77c51cd295b41a3e00588d45135024e5193892013e3b
-
C:\Users\Admin\AppData\Local\Temp\6e33b8c4439b9f7a7fe08b37075ab8346bfb2c9ae5ec48f3d84946274446c687.~01
Filesize75KB
MD5df2cbe2f92e64a6a8772900242c1a3b9
SHA13b5ca55a52adf2885bca7114ff60b4b0c45024ab
SHA2562f14ac1ebc2a5e41e59f142c6854fb66b3fceb87c5a7b1367b368fece06c5672
SHA512e6831a3b6ab35e990e1078b013fc4ebe6513d64cd75a30d023aa1610d65cff67497a12a9a4b8495b8cca77c51cd295b41a3e00588d45135024e5193892013e3b
-
Filesize
4KB
MD5f14bd85eeba2b828a655fe62931035e5
SHA1c6f962ab17705248f1c54675f3f02ee162d5a2b9
SHA25678350b4add47b0ffa7ad91912fd3937afe19671b08df79463abcbedb12e470db
SHA5129a825d7976e42259f7396e9bc174ae76a12e3464b7ea452270105a5510f97388c757c70d973fc94eefb715862e3b6c99edbd86b6ca936cd6670c7f3b7ea6fde2