Analysis
-
max time kernel
4s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe
Resource
win10v2004-20220812-en
General
-
Target
731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe
-
Size
2.8MB
-
MD5
4773d4c54dd30aa65291d050134e7333
-
SHA1
3ad740c29e481f9b245a31154ce937af77eeb94f
-
SHA256
731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6
-
SHA512
84029107b304cc8fadc911f5e6a127bf904b5b98c115cb060fe70ab3097cffa643fce614f2efcf416b13e7f56464508368fd5efb487648f3740764e68455f65c
-
SSDEEP
49152:bB+kqgBSBGIiRMgmJ4IjRX21LrePOSud0Pr1v9fKxTM+BxcIUveL5Z:bB+vVriR9fIj121LaPbud0D5lKxT5IIN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp -
Loads dropped DLL 4 IoCs
pid Process 892 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe 2036 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp 2036 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp 2036 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 892 wrote to memory of 2036 892 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe 27 PID 892 wrote to memory of 2036 892 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe 27 PID 892 wrote to memory of 2036 892 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe 27 PID 892 wrote to memory of 2036 892 731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe"C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp"C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp" /SL5="$70022,2560302,52224,C:\Users\Admin\AppData\Local\Temp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp
Filesize699KB
MD52df9dfb907f2fbec57fd5e64f6d68f62
SHA136c315e1d03c2d4dabc3e8a48889abd1ec97e364
SHA25697eb9ab26eeb54b432e3e83ca4c283e84ef4bce07f6c60a408f57e955f4ddc2b
SHA51214a92aba42e0b61c488978dd9a6f219aa415d2bc767749e5f1bc003155f293149cb42bed03e950467a4d5258e0ec46841ec56de5d6fd87a20fc200eeabbb6856
-
\Users\Admin\AppData\Local\Temp\is-8MR0R.tmp\731c43046d63537af24fb8ed0968631af38229e0ad22034f1fe6307a9353b7d6.tmp
Filesize699KB
MD52df9dfb907f2fbec57fd5e64f6d68f62
SHA136c315e1d03c2d4dabc3e8a48889abd1ec97e364
SHA25697eb9ab26eeb54b432e3e83ca4c283e84ef4bce07f6c60a408f57e955f4ddc2b
SHA51214a92aba42e0b61c488978dd9a6f219aa415d2bc767749e5f1bc003155f293149cb42bed03e950467a4d5258e0ec46841ec56de5d6fd87a20fc200eeabbb6856
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
36KB
MD5a4e5c512b047a6d9dc38549161cac4de
SHA149d3e74f9604a6c61cda04ccc6d3cda87e280dfb
SHA256c7f1e7e866834d9024f97c2b145c09d106e447e8abd65a10a1732116d178e44e
SHA5122edb8a492b8369d56dda735a652c9e08539a5c4709a794efaff91adcae192a636d0545725af16cf8c31b275b34c2f19e4b019b57fb9050b99de65a4c08e3eee1