Analysis
-
max time kernel
74s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-12-2022 07:32
Static task
static1
Behavioral task
behavioral1
Sample
a533eeaaec1a873d84936633e153dd0a.exe
Resource
win7-20220812-en
General
-
Target
a533eeaaec1a873d84936633e153dd0a.exe
-
Size
327KB
-
MD5
a533eeaaec1a873d84936633e153dd0a
-
SHA1
a16f84c4039ddccf9960cee21cb8860f2f1cf34c
-
SHA256
3f6c84150d51188f54330ce514518c879705052abad3f89325e9c279f1d9403e
-
SHA512
c599ec24478794dbe3fd1f3124bb93423b610a5d36eb76d625a2401fcc5f368ee40bca9585ba156a06747c593bc415369ae2106ee48b94044a72a59bd1949b79
-
SSDEEP
6144:3YktL97wOl/cNqWoZAR5Lv2mXMcXQEjSbjfxur/tb:d57rl/ccJ4omxjSbjJurR
Malware Config
Extracted
systembc
109.205.214.18:443
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mdtuu.exepid process 1936 mdtuu.exe -
Drops file in Windows directory 2 IoCs
Processes:
a533eeaaec1a873d84936633e153dd0a.exedescription ioc process File created C:\Windows\Tasks\mdtuu.job a533eeaaec1a873d84936633e153dd0a.exe File opened for modification C:\Windows\Tasks\mdtuu.job a533eeaaec1a873d84936633e153dd0a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a533eeaaec1a873d84936633e153dd0a.exepid process 1132 a533eeaaec1a873d84936633e153dd0a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1972 wrote to memory of 1936 1972 taskeng.exe mdtuu.exe PID 1972 wrote to memory of 1936 1972 taskeng.exe mdtuu.exe PID 1972 wrote to memory of 1936 1972 taskeng.exe mdtuu.exe PID 1972 wrote to memory of 1936 1972 taskeng.exe mdtuu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a533eeaaec1a873d84936633e153dd0a.exe"C:\Users\Admin\AppData\Local\Temp\a533eeaaec1a873d84936633e153dd0a.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
C:\Windows\system32\taskeng.exetaskeng.exe {C6314DC9-671F-4E9C-AA5A-86015217C5F1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\ProgramData\deaih\mdtuu.exeC:\ProgramData\deaih\mdtuu.exe start2⤵
- Executes dropped EXE
PID:1936
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5a533eeaaec1a873d84936633e153dd0a
SHA1a16f84c4039ddccf9960cee21cb8860f2f1cf34c
SHA2563f6c84150d51188f54330ce514518c879705052abad3f89325e9c279f1d9403e
SHA512c599ec24478794dbe3fd1f3124bb93423b610a5d36eb76d625a2401fcc5f368ee40bca9585ba156a06747c593bc415369ae2106ee48b94044a72a59bd1949b79
-
Filesize
327KB
MD5a533eeaaec1a873d84936633e153dd0a
SHA1a16f84c4039ddccf9960cee21cb8860f2f1cf34c
SHA2563f6c84150d51188f54330ce514518c879705052abad3f89325e9c279f1d9403e
SHA512c599ec24478794dbe3fd1f3124bb93423b610a5d36eb76d625a2401fcc5f368ee40bca9585ba156a06747c593bc415369ae2106ee48b94044a72a59bd1949b79