Analysis
-
max time kernel
131s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 01:53
Static task
static1
Behavioral task
behavioral1
Sample
894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe
Resource
win10v2004-20220812-en
General
-
Target
894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe
-
Size
85KB
-
MD5
61b5d3021283cb81179bde830789ccbc
-
SHA1
3d8ea71992e33000145df59a20ea501e71b910ca
-
SHA256
894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b
-
SHA512
e6661eee88b92b246133f023f48c0e1a8138931fe8bf7db61ce227f134da47c493e32a8a0cc201c6285231a06de708a031f326f2c036514d098701088c9e9be4
-
SSDEEP
1536:h9eii5NY0WEPKPHAekKserKp3o2We+nV4P6eVqiaSt/1u/W0RvBdBDRCG9+BVi:Lx0WEPKPHAerx2InV66eVq5SfuZzDoG/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1720 mxy5z9kn3.exe 1340 mxy5z9kn3.exe -
Loads dropped DLL 1 IoCs
pid Process 788 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1992 set thread context of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1720 set thread context of 1340 1720 mxy5z9kn3.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 1992 wrote to memory of 788 1992 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 28 PID 788 wrote to memory of 1720 788 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 29 PID 788 wrote to memory of 1720 788 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 29 PID 788 wrote to memory of 1720 788 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 29 PID 788 wrote to memory of 1720 788 894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe 29 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30 PID 1720 wrote to memory of 1340 1720 mxy5z9kn3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe"C:\Users\Admin\AppData\Local\Temp\894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exeC:\Users\Admin\AppData\Local\Temp\894c5326a6a8151dea1efa8ea361e1e7ee6060dd0c011d2a159e279b4c8ecf1b.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\mxy5z9kn3.exeC:\Users\Admin\AppData\Roaming\mxy5z9kn3.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\mxy5z9kn3.exeC:\Users\Admin\AppData\Roaming\mxy5z9kn3.exe4⤵
- Executes dropped EXE
PID:1340
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD578327923688eb7875110a9cc87caf940
SHA1d2ddaf6409b7629cc164f3f23d37a303488e26f6
SHA25605ff6b39b2c662f0f119ccd947f2bd4679cd37d055fea3244dbf2fc4c7d984d2
SHA5122245b7e9b28c6254b1b5d536ae368f8251271a857d33d3948e15cf228d1965a5143fbafa4a1967226d7a54f812879c541645e46c02e7f3e8505dc489ee2fc1dd
-
Filesize
85KB
MD578327923688eb7875110a9cc87caf940
SHA1d2ddaf6409b7629cc164f3f23d37a303488e26f6
SHA25605ff6b39b2c662f0f119ccd947f2bd4679cd37d055fea3244dbf2fc4c7d984d2
SHA5122245b7e9b28c6254b1b5d536ae368f8251271a857d33d3948e15cf228d1965a5143fbafa4a1967226d7a54f812879c541645e46c02e7f3e8505dc489ee2fc1dd
-
Filesize
85KB
MD578327923688eb7875110a9cc87caf940
SHA1d2ddaf6409b7629cc164f3f23d37a303488e26f6
SHA25605ff6b39b2c662f0f119ccd947f2bd4679cd37d055fea3244dbf2fc4c7d984d2
SHA5122245b7e9b28c6254b1b5d536ae368f8251271a857d33d3948e15cf228d1965a5143fbafa4a1967226d7a54f812879c541645e46c02e7f3e8505dc489ee2fc1dd
-
Filesize
85KB
MD578327923688eb7875110a9cc87caf940
SHA1d2ddaf6409b7629cc164f3f23d37a303488e26f6
SHA25605ff6b39b2c662f0f119ccd947f2bd4679cd37d055fea3244dbf2fc4c7d984d2
SHA5122245b7e9b28c6254b1b5d536ae368f8251271a857d33d3948e15cf228d1965a5143fbafa4a1967226d7a54f812879c541645e46c02e7f3e8505dc489ee2fc1dd