Analysis
-
max time kernel
4s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe
Resource
win10v2004-20221111-en
General
-
Target
87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe
-
Size
1.4MB
-
MD5
6c21b4b18ca473f3af7aeb5052a28427
-
SHA1
39be9ec5013c043fb54f1e55a71df14a1959700e
-
SHA256
87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
-
SHA512
cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f
-
SSDEEP
24576:azyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyzyz:gIIIIIIIIIIIIIIIIIIIIIIIIIIII
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 524 smss.exe 1504 smss.exe -
Loads dropped DLL 2 IoCs
pid Process 948 cmd.exe 948 cmd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\smss.exe 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe File created C:\Windows\system\smss.exe 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1216 wrote to memory of 948 1216 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe 28 PID 1216 wrote to memory of 948 1216 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe 28 PID 1216 wrote to memory of 948 1216 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe 28 PID 1216 wrote to memory of 948 1216 87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe 28 PID 948 wrote to memory of 524 948 cmd.exe 30 PID 948 wrote to memory of 524 948 cmd.exe 30 PID 948 wrote to memory of 524 948 cmd.exe 30 PID 948 wrote to memory of 524 948 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe"C:\Users\Admin\AppData\Local\Temp\87c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system\smss.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system\smss.exeC:\Windows\system\smss.exe3⤵
- Executes dropped EXE
PID:524
-
-
-
C:\Windows\system\smss.exeC:\Windows\system\smss.exe1⤵
- Executes dropped EXE
PID:1504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD56c21b4b18ca473f3af7aeb5052a28427
SHA139be9ec5013c043fb54f1e55a71df14a1959700e
SHA25687c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
SHA512cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f
-
Filesize
1.4MB
MD56c21b4b18ca473f3af7aeb5052a28427
SHA139be9ec5013c043fb54f1e55a71df14a1959700e
SHA25687c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
SHA512cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f
-
Filesize
1.4MB
MD56c21b4b18ca473f3af7aeb5052a28427
SHA139be9ec5013c043fb54f1e55a71df14a1959700e
SHA25687c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
SHA512cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f
-
Filesize
1.4MB
MD56c21b4b18ca473f3af7aeb5052a28427
SHA139be9ec5013c043fb54f1e55a71df14a1959700e
SHA25687c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
SHA512cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f
-
Filesize
1.4MB
MD56c21b4b18ca473f3af7aeb5052a28427
SHA139be9ec5013c043fb54f1e55a71df14a1959700e
SHA25687c281667afc91abbbb991627abc605f7c2053e85b50af47e517b961e5a77748
SHA512cf8b90d681d83b6ac8d83ee25d0b26272fbb07ccc63ca5717b2f0c09623d2f0817f2eb8b9d36bd908d611c0d10ca03543f89db972edb7c7e70d6950985abca6f