Analysis
-
max time kernel
164s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 16:20
Static task
static1
Behavioral task
behavioral1
Sample
a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe
Resource
win7-20221111-en
General
-
Target
a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe
-
Size
96KB
-
MD5
60e4922b223dcf281e195866bd0e4814
-
SHA1
0fa09c51403f00b5c0b7b5381234ea24b98bf854
-
SHA256
a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e
-
SHA512
f306d5eb8f523ed47b6646a12ebfd16dc496451649d83a7c27bfc9267e711cc076fbdf51de7015b2301f3668bf5a098767ddc8ebf073dc14e219b50b2afc2e60
-
SSDEEP
1536:i3FusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prjqNYg:iBS4jHS8q/3nTzePCwNUh4E9SYg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1652 fqqwicmbcf -
Deletes itself 1 IoCs
pid Process 1652 fqqwicmbcf -
Loads dropped DLL 2 IoCs
pid Process 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1652 fqqwicmbcf -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 960 wrote to memory of 1652 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe 28 PID 960 wrote to memory of 1652 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe 28 PID 960 wrote to memory of 1652 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe 28 PID 960 wrote to memory of 1652 960 a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe"C:\Users\Admin\AppData\Local\Temp\a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
\??\c:\users\admin\appdata\local\fqqwicmbcf"C:\Users\Admin\AppData\Local\Temp\a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe" a -sc:\users\admin\appdata\local\temp\a263198c3540ca0e3b1a45c9726746c0745707b099425b99396273befd93ea3e.exe2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.6MB
MD53b0c04be178fa38757fd1d5775a1069f
SHA17d32e06b0bae5cf3e3d53167db810867341ab55a
SHA2568d6cd2a7e9b31d970bcc40490d7719c991582b288971b6161742ebca733015d0
SHA512af02c714bb2942b3712156389aae7aa41bd5f1340603f99780d1665035c1185de3bd3c20320147617a6c129fc904d1792384657446bae264ecca5f149f74684b
-
Filesize
22.6MB
MD53b0c04be178fa38757fd1d5775a1069f
SHA17d32e06b0bae5cf3e3d53167db810867341ab55a
SHA2568d6cd2a7e9b31d970bcc40490d7719c991582b288971b6161742ebca733015d0
SHA512af02c714bb2942b3712156389aae7aa41bd5f1340603f99780d1665035c1185de3bd3c20320147617a6c129fc904d1792384657446bae264ecca5f149f74684b
-
Filesize
22.6MB
MD53b0c04be178fa38757fd1d5775a1069f
SHA17d32e06b0bae5cf3e3d53167db810867341ab55a
SHA2568d6cd2a7e9b31d970bcc40490d7719c991582b288971b6161742ebca733015d0
SHA512af02c714bb2942b3712156389aae7aa41bd5f1340603f99780d1665035c1185de3bd3c20320147617a6c129fc904d1792384657446bae264ecca5f149f74684b