Analysis
-
max time kernel
96s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe
Resource
win10v2004-20221111-en
General
-
Target
b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe
-
Size
260KB
-
MD5
5dd2c1bde59d87756a96b3210d3ff074
-
SHA1
b462c7b320d4af300cda15b68c301545b8f58991
-
SHA256
b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7
-
SHA512
cdd49828e0cbc9e6a7105adf79014ce92fd3ee0602cf980052e1290eea7edf8383c68c47a137a381ed1bb6e3e2d95dfbde80465688dc3fc6c0171adf19268a11
-
SSDEEP
6144:eTIBq4JsPCQi4Rnw9PK3dB844J3IIrzkcxzjf7RCYM/uUum:4IQ4KCQRK9C/wNII5xTs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 768 rejoice2007.exe -
Deletes itself 1 IoCs
pid Process 1368 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice2007.exe b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice2007.exe b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1676 wrote to memory of 768 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 28 PID 1676 wrote to memory of 768 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 28 PID 1676 wrote to memory of 768 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 28 PID 1676 wrote to memory of 768 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 28 PID 768 wrote to memory of 868 768 rejoice2007.exe 29 PID 768 wrote to memory of 868 768 rejoice2007.exe 29 PID 768 wrote to memory of 868 768 rejoice2007.exe 29 PID 768 wrote to memory of 868 768 rejoice2007.exe 29 PID 1676 wrote to memory of 1368 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 30 PID 1676 wrote to memory of 1368 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 30 PID 1676 wrote to memory of 1368 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 30 PID 1676 wrote to memory of 1368 1676 b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe"C:\Users\Admin\AppData\Local\Temp\b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice2007.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice2007.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵PID:868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files\Common Files\Microsoft Shared\MSINFO\Delet.bat""2⤵
- Deletes itself
PID:1368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD59c7dc63d42dc29832c37bb54fb8339c1
SHA1a84bf89d2a59c4913856d54ddb69b15a28ea2fba
SHA25629c0325e9956cc9236b19072603b04c529be49e646046093d79fc38f71e3138a
SHA51211142cc7a463fedbd89f61a93f49c07fddddf301f7b62b75b543bf2fde20387a75278976b8931d903ea5f7808cae311beaed1c4ddbdacb067f910ca18a6893b8
-
Filesize
260KB
MD55dd2c1bde59d87756a96b3210d3ff074
SHA1b462c7b320d4af300cda15b68c301545b8f58991
SHA256b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7
SHA512cdd49828e0cbc9e6a7105adf79014ce92fd3ee0602cf980052e1290eea7edf8383c68c47a137a381ed1bb6e3e2d95dfbde80465688dc3fc6c0171adf19268a11
-
Filesize
260KB
MD55dd2c1bde59d87756a96b3210d3ff074
SHA1b462c7b320d4af300cda15b68c301545b8f58991
SHA256b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7
SHA512cdd49828e0cbc9e6a7105adf79014ce92fd3ee0602cf980052e1290eea7edf8383c68c47a137a381ed1bb6e3e2d95dfbde80465688dc3fc6c0171adf19268a11
-
Filesize
260KB
MD55dd2c1bde59d87756a96b3210d3ff074
SHA1b462c7b320d4af300cda15b68c301545b8f58991
SHA256b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7
SHA512cdd49828e0cbc9e6a7105adf79014ce92fd3ee0602cf980052e1290eea7edf8383c68c47a137a381ed1bb6e3e2d95dfbde80465688dc3fc6c0171adf19268a11
-
Filesize
260KB
MD55dd2c1bde59d87756a96b3210d3ff074
SHA1b462c7b320d4af300cda15b68c301545b8f58991
SHA256b67223729bd6e312f4c14b48c9b79d161254a2dbe0a853646029ed4dba9347b7
SHA512cdd49828e0cbc9e6a7105adf79014ce92fd3ee0602cf980052e1290eea7edf8383c68c47a137a381ed1bb6e3e2d95dfbde80465688dc3fc6c0171adf19268a11