Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe
Resource
win10v2004-20220901-en
General
-
Target
be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe
-
Size
389KB
-
MD5
2758a4e83ed3d4bb46e8530fbbca9ab5
-
SHA1
fc51de7ac61fce726c3040653bd1f3ac717bf3ce
-
SHA256
be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae
-
SHA512
f9fed7e0f2a1994d4e6f8408d5d1b87213351870f6c81f80c9146fccc53bbffc21357c2afa382b9b25be7ef8cc8947981d4b85adade79c67ce3ae777ddc060c0
-
SSDEEP
12288:YLJPPY6rbDIJaKibTXblQc/971P8NtTird:YL5PY6rQ4/TXX9710TEd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4228 Windows111.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Delete.bat be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4228 Windows111.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4228 wrote to memory of 4964 4228 Windows111.exe 82 PID 4228 wrote to memory of 4964 4228 Windows111.exe 82 PID 1608 wrote to memory of 4992 1608 be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe 83 PID 1608 wrote to memory of 4992 1608 be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe 83 PID 1608 wrote to memory of 4992 1608 be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe"C:\Users\Admin\AppData\Local\Temp\be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:4992
-
-
C:\Windows111.exeC:\Windows111.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4964
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD52758a4e83ed3d4bb46e8530fbbca9ab5
SHA1fc51de7ac61fce726c3040653bd1f3ac717bf3ce
SHA256be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae
SHA512f9fed7e0f2a1994d4e6f8408d5d1b87213351870f6c81f80c9146fccc53bbffc21357c2afa382b9b25be7ef8cc8947981d4b85adade79c67ce3ae777ddc060c0
-
Filesize
389KB
MD52758a4e83ed3d4bb46e8530fbbca9ab5
SHA1fc51de7ac61fce726c3040653bd1f3ac717bf3ce
SHA256be304daae5ac76ff3971f3292149924a035581ad073fb24c18857535e0d036ae
SHA512f9fed7e0f2a1994d4e6f8408d5d1b87213351870f6c81f80c9146fccc53bbffc21357c2afa382b9b25be7ef8cc8947981d4b85adade79c67ce3ae777ddc060c0
-
Filesize
250B
MD50300319ea8195f578ed10b6273b27ce0
SHA1ac7f1e98a09ff3af0b5c0110db2ac746cb8c20a2
SHA2564d74174cb938d258dca3fd685da1927e95aed2f35784e6287226981c8b46fbad
SHA5120beba81246a162ab01df710970ad4faad747756b515b4d585a8fd75b3f7c59a0ba068b224a34fa82a7459bc0da6d114d9af9462d1494f4bb0eb7d383463be6d4