Analysis
-
max time kernel
3s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 03:35
Static task
static1
Behavioral task
behavioral1
Sample
e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe
Resource
win10v2004-20220812-en
General
-
Target
e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe
-
Size
570KB
-
MD5
09747cc81ea0cb6035ae36f5cb7ba7d0
-
SHA1
0ee5fcfd74c334d32d809f1ee87df5be4497630b
-
SHA256
e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea
-
SHA512
876c0d74e6954216fd51169f80155b1090428b6223ee8b293c2d02f5fff4fd4bea3368ab915a2663e08c52baa19a9e816534ef006383766976e34cf3a812ea51
-
SSDEEP
12288:uzvAquvIlhkweD5NxIALRVj+epB042j8XAl5a43OsXlooDPyfVzvAquv:uzvAZOhJyhzBnTAnaSOsVooDKzvAZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1356 Naver10.tmp -
Loads dropped DLL 2 IoCs
pid Process 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1356 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe 28 PID 1672 wrote to memory of 1356 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe 28 PID 1672 wrote to memory of 1356 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe 28 PID 1672 wrote to memory of 1356 1672 e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe"C:\Users\Admin\AppData\Local\Temp\e191ed7e7f7ee84d88306150b206ffc9d67705f4a40eaf2f5a459d73af092aea.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Naver10.tmpC:\Users\Admin\AppData\Local\Temp\Naver10.tmp OK2⤵
- Executes dropped EXE
PID:1356
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
571KB
MD5410d96f546ee9c09cdce8b9dfff711f4
SHA1fa080f9acaea2ac7f2f0d89674b0e79afbab332b
SHA256c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f
SHA512fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c
-
Filesize
571KB
MD5410d96f546ee9c09cdce8b9dfff711f4
SHA1fa080f9acaea2ac7f2f0d89674b0e79afbab332b
SHA256c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f
SHA512fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c
-
Filesize
571KB
MD5410d96f546ee9c09cdce8b9dfff711f4
SHA1fa080f9acaea2ac7f2f0d89674b0e79afbab332b
SHA256c8304edc40378f935c0d93e6d7e990bcef2d015ee2d7175ba1eee0cc6c783d6f
SHA512fa3835a9c31be963ef56fbc2fb56d22fa57efe7f24ea23c32768bbc1c0f6983ce591bc3796d3f003b5392ae9dfe203ba99780ef9f2bd8ed4acb3351884d4023c