Analysis
-
max time kernel
33s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe
Resource
win10v2004-20220901-en
General
-
Target
7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe
-
Size
146KB
-
MD5
3c120f5bb4cadf42c85719605c56ee60
-
SHA1
aa8d7961b1728a8a2e1235cb5b4079e5d7665660
-
SHA256
7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
-
SHA512
288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
SSDEEP
768:84e0yVJHBRO4z1J+5nO4rGQzTGfmgc33emu4v/eo4z7VP7LdGSu2HyTAzfMgTAzN:8BvPfFQVgd54vz2qjlSrL+
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 2044 360safe.exe 1088 360safe.exe 1532 360safe.exe 1604 360safe.exe 1728 360safe.exe 952 360safe.exe 912 360safe.exe -
Loads dropped DLL 14 IoCs
pid Process 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 2044 360safe.exe 2044 360safe.exe 1088 360safe.exe 1088 360safe.exe 1532 360safe.exe 1532 360safe.exe 1604 360safe.exe 1604 360safe.exe 1728 360safe.exe 1728 360safe.exe 952 360safe.exe 952 360safe.exe -
Drops file in System32 directory 28 IoCs
description ioc Process File created C:\Windows\SysWOW64\360safe.exe 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File created C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\360safe.exe 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\360safe.exe 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File created C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File created C:\Windows\SysWOW64\360safe.exe 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe File opened for modification C:\Windows\SysWOW64\360safe.exe 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 360safe.exe File opened for modification C:\Windows\SysWOW64\cctvbox.jpg 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe File created C:\Windows\SysWOW64\360safe.exe 360safe.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 2044 360safe.exe 1088 360safe.exe 1532 360safe.exe 1604 360safe.exe 1728 360safe.exe 952 360safe.exe 912 360safe.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2044 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 27 PID 2012 wrote to memory of 2044 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 27 PID 2012 wrote to memory of 2044 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 27 PID 2012 wrote to memory of 2044 2012 7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe 27 PID 2044 wrote to memory of 1088 2044 360safe.exe 28 PID 2044 wrote to memory of 1088 2044 360safe.exe 28 PID 2044 wrote to memory of 1088 2044 360safe.exe 28 PID 2044 wrote to memory of 1088 2044 360safe.exe 28 PID 1088 wrote to memory of 1532 1088 360safe.exe 29 PID 1088 wrote to memory of 1532 1088 360safe.exe 29 PID 1088 wrote to memory of 1532 1088 360safe.exe 29 PID 1088 wrote to memory of 1532 1088 360safe.exe 29 PID 1532 wrote to memory of 1604 1532 360safe.exe 30 PID 1532 wrote to memory of 1604 1532 360safe.exe 30 PID 1532 wrote to memory of 1604 1532 360safe.exe 30 PID 1532 wrote to memory of 1604 1532 360safe.exe 30 PID 1604 wrote to memory of 1728 1604 360safe.exe 31 PID 1604 wrote to memory of 1728 1604 360safe.exe 31 PID 1604 wrote to memory of 1728 1604 360safe.exe 31 PID 1604 wrote to memory of 1728 1604 360safe.exe 31 PID 1728 wrote to memory of 952 1728 360safe.exe 32 PID 1728 wrote to memory of 952 1728 360safe.exe 32 PID 1728 wrote to memory of 952 1728 360safe.exe 32 PID 1728 wrote to memory of 952 1728 360safe.exe 32 PID 952 wrote to memory of 912 952 360safe.exe 33 PID 952 wrote to memory of 912 952 360safe.exe 33 PID 952 wrote to memory of 912 952 360safe.exe 33 PID 952 wrote to memory of 912 952 360safe.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe"C:\Users\Admin\AppData\Local\Temp\7b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\360safe.exeC:\Windows\system32\360safe.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee
-
Filesize
146KB
MD53c120f5bb4cadf42c85719605c56ee60
SHA1aa8d7961b1728a8a2e1235cb5b4079e5d7665660
SHA2567b9528eb2a2763671a11e8845d810675fc5d2ac83e4a0c73206143c35b6f0ea0
SHA512288a0edf3a28d640ae74a9872e47cb28a8f820ece5dc40b9a4d95c5c3de4a10da376844ba24904c83e0be539cd4a99507afa13bc6bbc6a3180e6061711b81bee