Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 18:17
Static task
static1
Behavioral task
behavioral1
Sample
a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe
Resource
win10v2004-20220812-en
General
-
Target
a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe
-
Size
323KB
-
MD5
884e059425047f2c3271a88e482e486f
-
SHA1
a9003c333dacc6552949d7962c261841f0ca406c
-
SHA256
a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e
-
SHA512
2875ef89d213195a740cbf5b8640bc92dceb5cfe86739d2111d324d583a929847f0f8fcd0d4fff84b6959b3cfeedfb769a8680670c3e0bd18c4ec118abd755e8
-
SSDEEP
1536:u8rBDZgFLJzSLWTppiU5BnD8SlNDSzvHF5OaeCCVpguN4eSe+eooOoaoCoCo0oBR:5lZgFLGepiU5BAQ7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1360 Del31DB.tmp -
Deletes itself 1 IoCs
pid Process 1360 Del31DB.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\zxcvv.vbs a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe File opened for modification C:\WINDOWS\zxcvv.vbs Del31DB.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1748 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 27 PID 1492 wrote to memory of 1748 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 27 PID 1492 wrote to memory of 1748 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 27 PID 1492 wrote to memory of 1748 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 27 PID 1492 wrote to memory of 1360 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 28 PID 1492 wrote to memory of 1360 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 28 PID 1492 wrote to memory of 1360 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 28 PID 1492 wrote to memory of 1360 1492 a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe 28 PID 1360 wrote to memory of 296 1360 Del31DB.tmp 29 PID 1360 wrote to memory of 296 1360 Del31DB.tmp 29 PID 1360 wrote to memory of 296 1360 Del31DB.tmp 29 PID 1360 wrote to memory of 296 1360 Del31DB.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe"C:\Users\Admin\AppData\Local\Temp\a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\wscript.exe/nologo C:\WINDOWS\zxcvv.vbs2⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\Del31DB.tmpC:\Users\Admin\AppData\Local\Temp\Del31DB.tmp 156 "C:\Users\Admin\AppData\Local\Temp\a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\wscript.exe/nologo C:\WINDOWS\zxcvv.vbs3⤵PID:296
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD5884e059425047f2c3271a88e482e486f
SHA1a9003c333dacc6552949d7962c261841f0ca406c
SHA256a01dd6978ac4fbc8d75525d99f666ac4320cd8d97b1999c22157e0f282d13b9e
SHA5122875ef89d213195a740cbf5b8640bc92dceb5cfe86739d2111d324d583a929847f0f8fcd0d4fff84b6959b3cfeedfb769a8680670c3e0bd18c4ec118abd755e8
-
Filesize
266KB
MD5e54857b4590a2097ae9c67d700aa0366
SHA13afeac8582f22e5af9bf8fc6bb45f0c85357dac7
SHA25679f7d1725133388d18b976f6e2fd89813d57aa6c809939f7c4526cf1e2e312ae
SHA51204d0aef7adec0d2d7f674fbf577a2295098f06cd1b4e9b311d4f62fb6c5c4e592f7666c01ceefc9677fdde42f6dca4a6e3376152f7d7a7b9e0d77fc49f4f322d
-
Filesize
266KB
MD5e54857b4590a2097ae9c67d700aa0366
SHA13afeac8582f22e5af9bf8fc6bb45f0c85357dac7
SHA25679f7d1725133388d18b976f6e2fd89813d57aa6c809939f7c4526cf1e2e312ae
SHA51204d0aef7adec0d2d7f674fbf577a2295098f06cd1b4e9b311d4f62fb6c5c4e592f7666c01ceefc9677fdde42f6dca4a6e3376152f7d7a7b9e0d77fc49f4f322d