Analysis

  • max time kernel
    152s
  • max time network
    91s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 23:02

General

  • Target

    ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe

  • Size

    199KB

  • MD5

    7daa2c28b3fe1534cc042cb7e9540116

  • SHA1

    653bf2c496eabe8e1919f6eadfe39cd2c028dba5

  • SHA256

    ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80

  • SHA512

    7dea341eb6be62d0304511d5bf47945c496c24ac92c399a0192ff44aecd6fbb7f107b9fb8324ce1581a407cb3506efb08e93342f993a91096921a8921f4c6ee3

  • SSDEEP

    3072:pj1m0c65tHG06uxCiRSDz1BfDlNBcMXFPIS3guQikoFmfIBtN63btNZIECRnx2An:K0c65trNjIz1JrKM+Ux63nZUxLbn

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe
    "C:\Users\Admin\AppData\Local\Temp\ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\Rdolea.exe
      C:\Windows\Rdolea.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Rdolea.exe

    Filesize

    199KB

    MD5

    7daa2c28b3fe1534cc042cb7e9540116

    SHA1

    653bf2c496eabe8e1919f6eadfe39cd2c028dba5

    SHA256

    ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80

    SHA512

    7dea341eb6be62d0304511d5bf47945c496c24ac92c399a0192ff44aecd6fbb7f107b9fb8324ce1581a407cb3506efb08e93342f993a91096921a8921f4c6ee3

  • C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

    Filesize

    408B

    MD5

    eb6b5bf9d03e283220f11ac9a0c757fb

    SHA1

    792d603d77b4f1c089b4ac9fa58b8a9960064c8e

    SHA256

    abc5398eb461fdd6e4a11892e0a9d5843776e9085c9578a03e171e555880c2af

    SHA512

    cafc3ac112c94828e41fdbf36306e272311513ebb5a081ba5605abd68562d0de763b57324c47c00c928570d1b1f497062c715c0596be67a8dbc7a96ad1a371b4

  • memory/1436-61-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1436-64-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1744-54-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB

  • memory/1744-55-0x0000000000230000-0x000000000023E000-memory.dmp

    Filesize

    56KB

  • memory/1744-56-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1744-62-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1744-63-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB