Analysis
-
max time kernel
109s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 14:54
Static task
static1
Behavioral task
behavioral1
Sample
426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe
Resource
win7-20220812-en
General
-
Target
426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe
-
Size
20.7MB
-
MD5
70e42100914145f42e4104c6e1f22ee6
-
SHA1
1ce2daa5a21a0379ec324e041bdfe0c903c764d1
-
SHA256
426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388
-
SHA512
44863973efca25ac059bf1e9920da11d3d653f468b324d983077b315ccab3a9629b810e70e7fcf5d456a4283054ab58faafcabc779349434852f1d9822b28bd4
-
SSDEEP
6144:6Lm+N50Pve6Eq8tkfSOBlWWRmGwL4QQgKKX8x7/2xWqWma2XDzHPt281+nq:6v/0O6l8tpOjWtGNgDUiWqWNKDrt2zq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 dqrogwiuru -
Loads dropped DLL 2 IoCs
pid Process 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 968 wrote to memory of 1988 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe 27 PID 968 wrote to memory of 1988 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe 27 PID 968 wrote to memory of 1988 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe 27 PID 968 wrote to memory of 1988 968 426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe"C:\Users\Admin\AppData\Local\Temp\426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\users\admin\appdata\local\dqrogwiuru"C:\Users\Admin\AppData\Local\Temp\426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe" a -sc:\users\admin\appdata\local\temp\426c8ce49555ab2f91af42246e43b9ef78b85ef8733d8de043b3e1049dbc9388.exe2⤵
- Executes dropped EXE
PID:1988
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.8MB
MD517fdb304597435dcf4f23549c8ee068f
SHA13f26a1c7f3d85a5af91f81f86d7629c1993e01e0
SHA256daab0935afa803f3f3bbf19f474b8d0cb3a60819181811e47d65ed9bb1711ff1
SHA512feace3b3c44638a424b03d29cdd01cf7fff7517f2027ddddb3ca615ef2d22b59bf84fc613da73c01a5c9ab20c1b591e33acafcc2fe7fa98c83abdfb6d4614447
-
Filesize
22.8MB
MD517fdb304597435dcf4f23549c8ee068f
SHA13f26a1c7f3d85a5af91f81f86d7629c1993e01e0
SHA256daab0935afa803f3f3bbf19f474b8d0cb3a60819181811e47d65ed9bb1711ff1
SHA512feace3b3c44638a424b03d29cdd01cf7fff7517f2027ddddb3ca615ef2d22b59bf84fc613da73c01a5c9ab20c1b591e33acafcc2fe7fa98c83abdfb6d4614447
-
Filesize
22.8MB
MD517fdb304597435dcf4f23549c8ee068f
SHA13f26a1c7f3d85a5af91f81f86d7629c1993e01e0
SHA256daab0935afa803f3f3bbf19f474b8d0cb3a60819181811e47d65ed9bb1711ff1
SHA512feace3b3c44638a424b03d29cdd01cf7fff7517f2027ddddb3ca615ef2d22b59bf84fc613da73c01a5c9ab20c1b591e33acafcc2fe7fa98c83abdfb6d4614447