Analysis
-
max time kernel
187s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe
Resource
win10v2004-20221111-en
General
-
Target
ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe
-
Size
386KB
-
MD5
947821e64b0be77814225551bece1717
-
SHA1
8133b2cb60c1f1b75e1a577094ccc2a91ada3c11
-
SHA256
ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a
-
SHA512
172e64b4f66f9d70df4d259454005f59855c00e9a6b593be13696fb36b48323f97e483e4719151c33313482746795281051dd875956386dde95ab04c9ee06dc5
-
SSDEEP
12288:j7+v450hrIIEGpzK6FSkFv7adt7VRmc56RX:DmB5pzv8XRmc5mX
Malware Config
Signatures
-
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ini_f_i_l_e_tem.ini ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe File created C:\Windows\SysWOW64\Bat_f_i_l_e_tmp.bat ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe File opened for modification C:\Windows\SysWOW64\Bat_f_i_l_e_tmp.bat ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe File opened for modification C:\Windows\SysWOW64\Ini_f_i_l_e_tem.ini ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe File opened for modification C:\Windows\SysWOW64\cmd.exe ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1964 1776 ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe 27 PID 1776 wrote to memory of 1964 1776 ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe 27 PID 1776 wrote to memory of 1964 1776 ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe 27 PID 1776 wrote to memory of 1964 1776 ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe 27 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29 PID 1964 wrote to memory of 556 1964 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe"C:\Users\Admin\AppData\Local\Temp\ee911bd2520fec216e1dfda37c46e823592faee62ba1069c1290726fcff4d91a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Bat_f_i_l_e_tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32 /u /s C:\Windows\system32\shana.dll3⤵PID:556
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94B
MD580441fe0882f8727fdcdb4e60426f362
SHA1fd3914439560a54c2657a9f09d22254e15a17421
SHA256fbf25e03b128620ae2deb2e663b5715719c485872c0c253678d52613d2644c9e
SHA5120dbe796e9fdcbd993ce66b049a98b7a2aceb312740747657ed8749c6a37b84ccea198ba002249fe127bf84b2553f5483e54be592546da5bf9609bd99aa5a3a78