Analysis
-
max time kernel
108s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe
Resource
win7-20220812-en
General
-
Target
c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe
-
Size
98KB
-
MD5
371bb78624d73e172a8a6e9a0faf4331
-
SHA1
24a4663d3b42d094a0b9b9c18b997663f12a8ffa
-
SHA256
c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927
-
SHA512
69a13b07fa0cb5b949850419bca717f1388fa98733e0759edb5f5d66f9b2708a21345c1443c805f632184654b714da96c2819ecde97e8a52eaac65b632de39c4
-
SSDEEP
1536:SKFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prk23qlhzwYgD:SQS4jHS8q/3nTzePCwNUh4E9kBD+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1396 ftohsfffyr -
Loads dropped DLL 2 IoCs
pid Process 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 864 wrote to memory of 1396 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe 27 PID 864 wrote to memory of 1396 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe 27 PID 864 wrote to memory of 1396 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe 27 PID 864 wrote to memory of 1396 864 c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe"C:\Users\Admin\AppData\Local\Temp\c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
\??\c:\users\admin\appdata\local\ftohsfffyr"C:\Users\Admin\AppData\Local\Temp\c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe" a -sc:\users\admin\appdata\local\temp\c5ddaee7ad6047ed4395473b86693af38d8c2fefe2172ac09d7a68a90446d927.exe2⤵
- Executes dropped EXE
PID:1396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.4MB
MD51fc4708c81f5d5504b53f558ae556fb7
SHA137cc06dc3e477df2afca6f2079e41733c77f9a95
SHA2566771cf43ad31b2052d3d01a9d14b97fd7fa038c752414d7a305fc8ae0a28dd31
SHA512bc139863cef77932864546519d6f4562a552a8fcd23986ff405c09779db0495d5786389fff8ee809f918eccd35bcbd7a2d01ef4672c08f563e0c167ed0fd1579
-
Filesize
20.4MB
MD51fc4708c81f5d5504b53f558ae556fb7
SHA137cc06dc3e477df2afca6f2079e41733c77f9a95
SHA2566771cf43ad31b2052d3d01a9d14b97fd7fa038c752414d7a305fc8ae0a28dd31
SHA512bc139863cef77932864546519d6f4562a552a8fcd23986ff405c09779db0495d5786389fff8ee809f918eccd35bcbd7a2d01ef4672c08f563e0c167ed0fd1579
-
Filesize
20.4MB
MD51fc4708c81f5d5504b53f558ae556fb7
SHA137cc06dc3e477df2afca6f2079e41733c77f9a95
SHA2566771cf43ad31b2052d3d01a9d14b97fd7fa038c752414d7a305fc8ae0a28dd31
SHA512bc139863cef77932864546519d6f4562a552a8fcd23986ff405c09779db0495d5786389fff8ee809f918eccd35bcbd7a2d01ef4672c08f563e0c167ed0fd1579