Analysis
-
max time kernel
3s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe
Resource
win10v2004-20220812-en
General
-
Target
99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe
-
Size
635KB
-
MD5
27e1747ba2aea53d7cc56fbfd62932a0
-
SHA1
5c4b06233af9ee88aec80ee799a2c4f12607ff36
-
SHA256
99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85
-
SHA512
f2161aec9505ebd4cc4bd72cf4aa9fc8c7f34807b589a4fe776597051bac3113c0dc31f2688edf47fe6f60b40143cd6cfbcde67a17b66027dc0c448714f7940f
-
SSDEEP
12288:mEtDt+QFAYvL7+3uhyMNfAsLfozPCOZ/5hNeGX9UZPTjOpMZaBY/x4b7GEtDt+Q:LTdvvdBfAXTBhqt4MZaB3rT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 948 ~DFA79.tmp -
Loads dropped DLL 1 IoCs
pid Process 2040 99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 948 2040 99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe 28 PID 2040 wrote to memory of 948 2040 99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe 28 PID 2040 wrote to memory of 948 2040 99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe 28 PID 2040 wrote to memory of 948 2040 99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe"C:\Users\Admin\AppData\Local\Temp\99539cf640e748e0ff3b14565c0e8230f7de9c40f9bab45be9c3790139c0be85.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\~DFA79.tmpC:\Users\Admin\AppData\Local\Temp\~DFA79.tmp OK2⤵
- Executes dropped EXE
PID:948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636KB
MD59a9717f8504a421c9248bdb12dc8ddeb
SHA1a8ff68d180c982c8d643b195fb13a9837ed038b7
SHA256684beb58594407088fb6fdaf63edb3001659e031346e58e7ce0acb1447a74aec
SHA5121808cd95c320e5f08bb61c31f264857472539e8b0704e4020f43ad6431bf111bb86248026b51308694f4f7d111bed2550e788a96e5567817d112b0895aa1dd1b
-
Filesize
636KB
MD59a9717f8504a421c9248bdb12dc8ddeb
SHA1a8ff68d180c982c8d643b195fb13a9837ed038b7
SHA256684beb58594407088fb6fdaf63edb3001659e031346e58e7ce0acb1447a74aec
SHA5121808cd95c320e5f08bb61c31f264857472539e8b0704e4020f43ad6431bf111bb86248026b51308694f4f7d111bed2550e788a96e5567817d112b0895aa1dd1b