Analysis
-
max time kernel
53s -
max time network
102s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 03:32
Static task
static1
Behavioral task
behavioral1
Sample
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
Resource
win10v2004-20221111-en
General
-
Target
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe
-
Size
454KB
-
MD5
4ed3ce2511f5c6aa47e9d24add6bed61
-
SHA1
7ad0e32073ae935a26a7f2619581a5c0295a6ddb
-
SHA256
730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e
-
SHA512
8a056eec53346ad45b48eea2c9349f821aa0cb692d79772f14270a30d21b9fa18fdffedace436be70d21e658017d057810e954561b79ffef9ac72b9f204fb531
-
SSDEEP
6144:o2Kgo6ZWWeT0v1hX9ExB7xAybCBxm6Dn9zonpOiqHZOGMu6wEe3:o96ZWWx237+ybGNonppyZOGMRwEe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1492 gxqL4BeCpSIde9L.exe 1476 gxqL4BeCpSIde9L.exe -
Deletes itself 1 IoCs
pid Process 1476 gxqL4BeCpSIde9L.exe -
Loads dropped DLL 4 IoCs
pid Process 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 1476 gxqL4BeCpSIde9L.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\KKAUUnnEg64j = "C:\\ProgramData\\X22fKG6262uF\\gxqL4BeCpSIde9L.exe" 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1668 set thread context of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1492 set thread context of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1476 set thread context of 668 1476 gxqL4BeCpSIde9L.exe 31 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1668 wrote to memory of 1520 1668 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 28 PID 1520 wrote to memory of 1492 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 29 PID 1520 wrote to memory of 1492 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 29 PID 1520 wrote to memory of 1492 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 29 PID 1520 wrote to memory of 1492 1520 730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe 29 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1492 wrote to memory of 1476 1492 gxqL4BeCpSIde9L.exe 30 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31 PID 1476 wrote to memory of 668 1476 gxqL4BeCpSIde9L.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"C:\Users\Admin\AppData\Local\Temp\730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\ProgramData\X22fKG6262uF\gxqL4BeCpSIde9L.exe"C:\ProgramData\X22fKG6262uF\gxqL4BeCpSIde9L.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\ProgramData\X22fKG6262uF\gxqL4BeCpSIde9L.exe"C:\ProgramData\X22fKG6262uF\gxqL4BeCpSIde9L.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe" /i:14765⤵PID:668
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33
-
Filesize
454KB
MD54ed3ce2511f5c6aa47e9d24add6bed61
SHA17ad0e32073ae935a26a7f2619581a5c0295a6ddb
SHA256730243200dcf1c2bb4af6de8cc6714ec18e0953552558ab2f16f9f5333d10a7e
SHA5128a056eec53346ad45b48eea2c9349f821aa0cb692d79772f14270a30d21b9fa18fdffedace436be70d21e658017d057810e954561b79ffef9ac72b9f204fb531
-
Filesize
454KB
MD509fa8644317eae8fee28ac27ee5fcf2a
SHA1df8fde3c42faf064bc0d92b4886ea4691a667102
SHA2569db9136916040923fcb7a698f36395eba7f3f6e8b7a47b00459d9fdaa63851d0
SHA5127faaa901f0ff26586a0bb04b3028e8a62cc151a6a18dbe4441db28885aa649c0ff0aff29b79b3b6c89e1c400b4c5b211584aa0d94db3ce8b10eba58264d1dc33