Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-12-2022 18:17
Static task
static1
Behavioral task
behavioral1
Sample
52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe
Resource
win7-20220812-en
General
-
Target
52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe
-
Size
240KB
-
MD5
ca810ef2745de0c5636e539a80fc3467
-
SHA1
28d303ec336b54aa0ed4796e93481f788428f4b3
-
SHA256
52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436
-
SHA512
58e788b25302a3c3f29dd95fab61c74ef3971d3ea654c66ca3446a878f29e129a286cf7170bde023435b9328f98224774089ff08005d957ae6245d02ab9c92de
-
SSDEEP
3072:cVvnL5hvxGKtzu5vP5XNfO3uvIjpgxGvQjohdBcf0EmoZgRbR8pgX:aLNGKtUdG3uv8pgxmQjoyftccpgX
Malware Config
Extracted
systembc
109.205.214.18:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dnlf.exepid process 1124 dnlf.exe -
Drops file in Windows directory 2 IoCs
Processes:
52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exedescription ioc process File created C:\Windows\Tasks\dnlf.job 52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe File opened for modification C:\Windows\Tasks\dnlf.job 52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exepid process 1996 52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1480 wrote to memory of 1124 1480 taskeng.exe dnlf.exe PID 1480 wrote to memory of 1124 1480 taskeng.exe dnlf.exe PID 1480 wrote to memory of 1124 1480 taskeng.exe dnlf.exe PID 1480 wrote to memory of 1124 1480 taskeng.exe dnlf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe"C:\Users\Admin\AppData\Local\Temp\52d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
C:\Windows\system32\taskeng.exetaskeng.exe {610FC412-A23F-46E4-A370-6523079DEDBA} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\ProgramData\orjfw\dnlf.exeC:\ProgramData\orjfw\dnlf.exe start2⤵
- Executes dropped EXE
PID:1124
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5ca810ef2745de0c5636e539a80fc3467
SHA128d303ec336b54aa0ed4796e93481f788428f4b3
SHA25652d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436
SHA51258e788b25302a3c3f29dd95fab61c74ef3971d3ea654c66ca3446a878f29e129a286cf7170bde023435b9328f98224774089ff08005d957ae6245d02ab9c92de
-
Filesize
240KB
MD5ca810ef2745de0c5636e539a80fc3467
SHA128d303ec336b54aa0ed4796e93481f788428f4b3
SHA25652d1b27dddcf8fc24ea4258f108fc186feeaa95d9b882341c7a49a5d8b819436
SHA51258e788b25302a3c3f29dd95fab61c74ef3971d3ea654c66ca3446a878f29e129a286cf7170bde023435b9328f98224774089ff08005d957ae6245d02ab9c92de