Analysis
-
max time kernel
153s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe
Resource
win10v2004-20220812-en
General
-
Target
67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe
-
Size
72KB
-
MD5
88da9856171fc2481928cde6ff790a8c
-
SHA1
2c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
-
SHA256
67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
-
SHA512
a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
SSDEEP
1536:JklfT6jUQ8lTA50bF/k58t0G7bbpkNYJDIKpHi1bHXo:Sl76ls05SF82CG7b1kIxC1b3o
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 892 exp.exe 668 exp.exe 1680 exp.exe -
Deletes itself 1 IoCs
pid Process 892 exp.exe -
Loads dropped DLL 2 IoCs
pid Process 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\~backup~ = "C:\\Users\\Admin\\Documents\\AppData\\exp.exe" 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\~tempbackup~ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe" 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 892 exp.exe 892 exp.exe 668 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 892 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 892 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe 892 exp.exe 892 exp.exe 668 exp.exe 1680 exp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 892 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe 28 PID 2036 wrote to memory of 892 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe 28 PID 2036 wrote to memory of 892 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe 28 PID 2036 wrote to memory of 892 2036 67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe 28 PID 892 wrote to memory of 668 892 exp.exe 29 PID 892 wrote to memory of 668 892 exp.exe 29 PID 892 wrote to memory of 668 892 exp.exe 29 PID 892 wrote to memory of 668 892 exp.exe 29 PID 892 wrote to memory of 1680 892 exp.exe 30 PID 892 wrote to memory of 1680 892 exp.exe 30 PID 892 wrote to memory of 1680 892 exp.exe 30 PID 892 wrote to memory of 1680 892 exp.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe"C:\Users\Admin\AppData\Local\Temp\67c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\Documents\AppData\exp.exe"C:\Users\Admin\Documents\AppData\exp.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\Documents\AppData\exp.exeC:\Users\Admin\Documents\AppData\exp.exe -addcopy3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Users\Admin\Documents\AppData\exp.exeC:\Users\Admin\Documents\AppData\exp.exe -addcopy3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5799fe6768c4447e52701c2da61fd4514
SHA1cfd4d0e8da685c2c22b2432a009cbef945dd89bb
SHA256acfc8095a5b7a589fbefe272d0bb5dbc16f494c24966db1e9f3fdb234801ab07
SHA51280f633b812bd33765b32b0078b55ae6ed93f5442815e5784886b5d204805e94735f8d7b22e87d8ef5ccf2bd5ce8adbd26089555d5aa09058eb2a9a33f196dddb
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac
-
Filesize
72KB
MD588da9856171fc2481928cde6ff790a8c
SHA12c23abec5d64898c3e6cfa5a9ed4f2a4a146342e
SHA25667c086df4c3deb50f9882c25271637d49f7758ec687cb385db1632e387024a79
SHA512a0f61f8f00992a156ef98cb1c2b7defdb99ff16c820a95bf664aad1a9033eb1e98aeb76cd82d3f0fa46ec205cac4b1af32594f1eded292c7964594a92b9de8ac