Analysis
-
max time kernel
99s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
Resource
win10v2004-20220812-en
General
-
Target
86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
-
Size
147KB
-
MD5
cadf029e3896480f047ba30f99e0954b
-
SHA1
149e5a3819cff56eeb0f80811ca4937af3479bba
-
SHA256
86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed
-
SHA512
c0fa32169bc307315c42dd0778c18ee42b45ca86db5eeb27f6b6da45385da595d7015b6e4e11a9a567174dc330b8503ecef381d57dd518a2ee0cb34f4de8d7c8
-
SSDEEP
3072:vyH99g4byc6H5c6HcT66vlmm+O2bb4ndujZGkfYvypE4oIdhsC6ipKE8Ba:vyH7xOc6H5c6HcT66vlma+jnsniv8Ba
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1956 svchost.exe 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 876 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1956 svchost.exe 1956 svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1956 1476 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 27 PID 1476 wrote to memory of 1956 1476 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 27 PID 1476 wrote to memory of 1956 1476 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 27 PID 1476 wrote to memory of 1956 1476 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 27 PID 1956 wrote to memory of 1256 1956 svchost.exe 28 PID 1956 wrote to memory of 1256 1956 svchost.exe 28 PID 1956 wrote to memory of 1256 1956 svchost.exe 28 PID 1956 wrote to memory of 1256 1956 svchost.exe 28 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30 PID 1256 wrote to memory of 1060 1256 86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe"C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe"C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe setupapi,InstallHinfSection DefaultUninstall 128 sisdiff.INF4⤵PID:1060
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:876
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
Filesize112KB
MD5a67bd20936b060c29f9ae550c1a5011c
SHA115eed35ed01ecd1f12407c18442c8d5af29d4cee
SHA2566f323b04cade4661c5a60e6183b97ae52c074589af4de781435815fb30985fb8
SHA51219a3677c66db93be878a66f14761dd778e46589ed350cac602badffed6ad34ca2e5b3a0ab00f787a5e5548e57e8f689e39b8e327b54640e11f7f214c063d2199
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
Filesize112KB
MD5a67bd20936b060c29f9ae550c1a5011c
SHA115eed35ed01ecd1f12407c18442c8d5af29d4cee
SHA2566f323b04cade4661c5a60e6183b97ae52c074589af4de781435815fb30985fb8
SHA51219a3677c66db93be878a66f14761dd778e46589ed350cac602badffed6ad34ca2e5b3a0ab00f787a5e5548e57e8f689e39b8e327b54640e11f7f214c063d2199
-
\Users\Admin\AppData\Local\Temp\86b7e12b641d6acb59f6b387cfedbfb9f672e8a156fb989f894c4091a875c1ed.exe
Filesize112KB
MD5a67bd20936b060c29f9ae550c1a5011c
SHA115eed35ed01ecd1f12407c18442c8d5af29d4cee
SHA2566f323b04cade4661c5a60e6183b97ae52c074589af4de781435815fb30985fb8
SHA51219a3677c66db93be878a66f14761dd778e46589ed350cac602badffed6ad34ca2e5b3a0ab00f787a5e5548e57e8f689e39b8e327b54640e11f7f214c063d2199