Analysis
-
max time kernel
48s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 14:11
Static task
static1
Behavioral task
behavioral1
Sample
de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe
Resource
win10v2004-20220901-en
General
-
Target
de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe
-
Size
200KB
-
MD5
95d570525788f368d0f5f82ab1d59f4c
-
SHA1
c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146
-
SHA256
de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d
-
SHA512
e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a
-
SSDEEP
3072:2fh3Z9RXDsFSAuQutZtr6YI7qPD56xe4oBM5+N9uywrZ3xcMSkSAxa:cRQup6Y775cF5+Hu5rZ3HNa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 996 RWNW47MSMLLMS.EXE 556 RWNW47O7BA.EXE -
Loads dropped DLL 4 IoCs
pid Process 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 996 RWNW47MSMLLMS.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 556 RWNW47O7BA.EXE 556 RWNW47O7BA.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 996 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 27 PID 1720 wrote to memory of 996 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 27 PID 1720 wrote to memory of 996 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 27 PID 1720 wrote to memory of 996 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 27 PID 1720 wrote to memory of 556 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 28 PID 1720 wrote to memory of 556 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 28 PID 1720 wrote to memory of 556 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 28 PID 1720 wrote to memory of 556 1720 de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe"C:\Users\Admin\AppData\Local\Temp\de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47MSMLLMS.EXE"C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47MSMLLMS.EXE"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47O7BA.EXE"C:\USERS\ADMIN\APPDATA\LOCAL\TEMP\RWNW47O7BA.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD595d570525788f368d0f5f82ab1d59f4c
SHA1c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146
SHA256de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d
SHA512e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a
-
Filesize
24KB
MD584d305b680807aa668af0d5b09cab960
SHA180e5b871f0f967e134c644bd93abf5d2a68c1a94
SHA256d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c
SHA5123e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51
-
Filesize
10B
MD5dfdaa4d245e453f865ce39b0b12b12ae
SHA13f709971c7a1f69d247e28eaf7dc53126c501823
SHA2564823d7d21c7faade58b12c59b64ebed74c8014d757904fd7152d29240b4e6872
SHA5122b83d351876158812155f1aa43fd1e2404f90b0f375f17f9b5d7a36bfb4211fe3a06124b3a1a807db5b2e0e265069e94b361425596e9c8867cb3bc05f5e72a67
-
Filesize
200KB
MD595d570525788f368d0f5f82ab1d59f4c
SHA1c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146
SHA256de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d
SHA512e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a
-
Filesize
200KB
MD595d570525788f368d0f5f82ab1d59f4c
SHA1c2ffb76da6ee18c7e1cb04a8fe7bed534dde7146
SHA256de53524dbc1d385c202511386d82989c33c8c1b7fa27adf0e1de7587d623267d
SHA512e1b6d81796c5cfc1c51c9bcd5e787bd843f12d4007435e2277a603e35cd76ee67e2d0941861e64d83f9ed35572c4a64eca9055fc83c366ce99fef45c0978c25a
-
Filesize
24KB
MD584d305b680807aa668af0d5b09cab960
SHA180e5b871f0f967e134c644bd93abf5d2a68c1a94
SHA256d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c
SHA5123e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51
-
Filesize
24KB
MD584d305b680807aa668af0d5b09cab960
SHA180e5b871f0f967e134c644bd93abf5d2a68c1a94
SHA256d54fb3bbb48fade629d8f158f5053a8bad4a2f6a9525d52baec2da1116a03b5c
SHA5123e2fd157a4b3bc0cc02dfdb6e35f3ec8676122d231bf98baf0a35986d9088827e871fc74c59254edb59c88aee78cddcdbffce3be64745a1d84d69a2158a65b51