Analysis
-
max time kernel
4s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:12
Static task
static1
Behavioral task
behavioral1
Sample
5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
Resource
win10v2004-20221111-en
General
-
Target
5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
-
Size
1.2MB
-
MD5
8a94fad07ce894522817e6d67d39166b
-
SHA1
38a56346a3bb405d734a85cf0eab5ba62057bf80
-
SHA256
5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a
-
SHA512
887aa39f41b67be47d51de26a1c177f4b8da558fc37c9200f6f23a6c0e9105548812a4cf5b8ded67ba4342115c673492af202ea004f5cf511416977201e4a4c8
-
SSDEEP
6144:SyH7xOc6H5c6HcT66vlmiQeVRsRjIoBQfTP1108+Z0VnC6Waf4zIu+L62I//ee/h:Sa1Iu308+Z0AzmNI//4qId/dGwdhI
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2036 svchost.exe 1056 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 2008 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 svchost.exe 2036 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1056 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 1056 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2036 1992 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 28 PID 1992 wrote to memory of 2036 1992 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 28 PID 1992 wrote to memory of 2036 1992 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 28 PID 1992 wrote to memory of 2036 1992 5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe 28 PID 2036 wrote to memory of 1056 2036 svchost.exe 29 PID 2036 wrote to memory of 1056 2036 svchost.exe 29 PID 2036 wrote to memory of 1056 2036 svchost.exe 29 PID 2036 wrote to memory of 1056 2036 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe"C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe"C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:2008
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
Filesize1.2MB
MD5c39c483ff2fcb2f91a1853c7a7e97c26
SHA13d2810df6ce3cf45f564c60b4f2a48085b008e79
SHA256a9339e2c95e5d51a81ece911294a05a0f100728061a4adeb100dcda31c802a69
SHA51261360fc5a76e3841295b4e8f70053110f400413bd484c6b0b0850db2d0464bfbb0bec26d0bfcaf5d83e92857bc7e730fca0b8798462ec032a21541ee52e7cd2d
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
Filesize1.2MB
MD5c39c483ff2fcb2f91a1853c7a7e97c26
SHA13d2810df6ce3cf45f564c60b4f2a48085b008e79
SHA256a9339e2c95e5d51a81ece911294a05a0f100728061a4adeb100dcda31c802a69
SHA51261360fc5a76e3841295b4e8f70053110f400413bd484c6b0b0850db2d0464bfbb0bec26d0bfcaf5d83e92857bc7e730fca0b8798462ec032a21541ee52e7cd2d
-
\Users\Admin\AppData\Local\Temp\5f29e4f1fa2b2a19e49637a6969a14ea2718b8f2377ffb9258652cccb305953a.exe
Filesize1.2MB
MD5c39c483ff2fcb2f91a1853c7a7e97c26
SHA13d2810df6ce3cf45f564c60b4f2a48085b008e79
SHA256a9339e2c95e5d51a81ece911294a05a0f100728061a4adeb100dcda31c802a69
SHA51261360fc5a76e3841295b4e8f70053110f400413bd484c6b0b0850db2d0464bfbb0bec26d0bfcaf5d83e92857bc7e730fca0b8798462ec032a21541ee52e7cd2d