Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe
Resource
win10v2004-20220812-en
General
-
Target
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe
-
Size
312KB
-
MD5
29726fc9034dcb792b66752170fa49a3
-
SHA1
f164c91db8ca909f6f6e0e9c706b288dece944d6
-
SHA256
7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
-
SHA512
158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
SSDEEP
6144:8NSKQMLdz5NpPrL88qwKUDkhu6b/jtevbST:+LrNqwKUIhEb
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 536 winupdate.exe 1076 winupdate.exe 2040 winupdate.exe 1000 winupdate.exe 1696 winupdate.exe -
Loads dropped DLL 20 IoCs
pid Process 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe File opened for modification C:\Windows\SysWOW64\winupdate.exe 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\winupdate.exe winupdate.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 536 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 1076 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 2040 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1000 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe 1696 winupdate.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 1520 wrote to memory of 536 1520 7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe 28 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 536 wrote to memory of 1076 536 winupdate.exe 29 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 1076 wrote to memory of 2040 1076 winupdate.exe 30 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 2040 wrote to memory of 1000 2040 winupdate.exe 31 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32 PID 1000 wrote to memory of 1696 1000 winupdate.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe"C:\Users\Admin\AppData\Local\Temp\7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe -bai C:\Users\Admin\AppData\Local\Temp\7e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe -bai C:\Windows\SysWOW64\winupdate.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe -bai C:\Windows\SysWOW64\winupdate.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe -bai C:\Windows\SysWOW64\winupdate.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\winupdate.exeC:\Windows\system32\winupdate.exe -bai C:\Windows\SysWOW64\winupdate.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f
-
Filesize
312KB
MD529726fc9034dcb792b66752170fa49a3
SHA1f164c91db8ca909f6f6e0e9c706b288dece944d6
SHA2567e41d5836a0268aaed0bbac7d3c0beb8aaaed34a7b22a691d4750e7aae3771ae
SHA512158531d6e4d431979761fb506bc0ebd876bdbe0287fd0da85c159d578b499be87f488afab6acd83a2b2426710cd6efb92093386af984d546e5f111e9adb1a80f