Analysis
-
max time kernel
152s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe
Resource
win10v2004-20220812-en
General
-
Target
ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe
-
Size
199KB
-
MD5
7daa2c28b3fe1534cc042cb7e9540116
-
SHA1
653bf2c496eabe8e1919f6eadfe39cd2c028dba5
-
SHA256
ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80
-
SHA512
7dea341eb6be62d0304511d5bf47945c496c24ac92c399a0192ff44aecd6fbb7f107b9fb8324ce1581a407cb3506efb08e93342f993a91096921a8921f4c6ee3
-
SSDEEP
3072:pj1m0c65tHG06uxCiRSDz1BfDlNBcMXFPIS3guQikoFmfIBtN63btNZIECRnx2An:K0c65trNjIz1JrKM+Ux63nZUxLbn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1436 Rdolea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run Rdolea.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\V71IQL7HI7 = "C:\\Windows\\Rdolea.exe" Rdolea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe File created C:\Windows\Rdolea.exe ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe File opened for modification C:\Windows\Rdolea.exe ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\International Rdolea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe 1436 Rdolea.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1744 ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe 1436 Rdolea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1436 1744 ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe 28 PID 1744 wrote to memory of 1436 1744 ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe 28 PID 1744 wrote to memory of 1436 1744 ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe 28 PID 1744 wrote to memory of 1436 1744 ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe"C:\Users\Admin\AppData\Local\Temp\ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\Rdolea.exeC:\Windows\Rdolea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD57daa2c28b3fe1534cc042cb7e9540116
SHA1653bf2c496eabe8e1919f6eadfe39cd2c028dba5
SHA256ddadc24dd898f1311a858bfe2ebe749f4f6932677f90f54ff49ef1fa9852be80
SHA5127dea341eb6be62d0304511d5bf47945c496c24ac92c399a0192ff44aecd6fbb7f107b9fb8324ce1581a407cb3506efb08e93342f993a91096921a8921f4c6ee3
-
Filesize
408B
MD5eb6b5bf9d03e283220f11ac9a0c757fb
SHA1792d603d77b4f1c089b4ac9fa58b8a9960064c8e
SHA256abc5398eb461fdd6e4a11892e0a9d5843776e9085c9578a03e171e555880c2af
SHA512cafc3ac112c94828e41fdbf36306e272311513ebb5a081ba5605abd68562d0de763b57324c47c00c928570d1b1f497062c715c0596be67a8dbc7a96ad1a371b4