Analysis
-
max time kernel
84s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06-01-2023 08:50
Static task
static1
Behavioral task
behavioral1
Sample
fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe
Resource
win10-20220812-en
General
-
Target
fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe
-
Size
3.7MB
-
MD5
14787312f0ea4d42b19f81059fae2bac
-
SHA1
678d81248b3057914df972c47b9dcc77b789c9bc
-
SHA256
fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f
-
SHA512
1bf37f81674d8e97d1c7f092572f350a09a9c35dbd49b38ed2abe7fea1edbc4efe75b0e0e1eb6822f7b78d2d71b7bb39bb1cbfccb6b297765b82209d45d3ee84
-
SSDEEP
98304:7Q6Na8x1h0nAEBq4Ej/L5SViLd6l5KZy4qy9yb:USauhWdq4EP56iR62ZN10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3796 rundll32.exe 3796 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3796 3668 fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe 66 PID 3668 wrote to memory of 3796 3668 fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe 66 PID 3668 wrote to memory of 3796 3668 fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe"C:\Users\Admin\AppData\Local\Temp\fa42f6e86a7c3c5cbea6799e374f7eb05c6ebbe618a1499616197da5bc6f437f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Rewurtuihyfrtty.dll,start2⤵
- Loads dropped DLL
PID:3796
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD55c89caae94d426d438854cd101a915a5
SHA149f3e393f6c8b78edca1c54fcf6d457e77198f5a
SHA2566573e399052a9db5580dbebfd53586cd6d1a2910435e1d743e43186e5d2b4ff9
SHA512630f482df4e19f80d462454196e042e66507a9ebf89ef9ea4e4f43e209d01a7860cd11131b24da08f00a3ef79d3b6ec02a698d738da70925d668a3599b0db06e
-
Filesize
4.3MB
MD55c89caae94d426d438854cd101a915a5
SHA149f3e393f6c8b78edca1c54fcf6d457e77198f5a
SHA2566573e399052a9db5580dbebfd53586cd6d1a2910435e1d743e43186e5d2b4ff9
SHA512630f482df4e19f80d462454196e042e66507a9ebf89ef9ea4e4f43e209d01a7860cd11131b24da08f00a3ef79d3b6ec02a698d738da70925d668a3599b0db06e
-
Filesize
4.3MB
MD55c89caae94d426d438854cd101a915a5
SHA149f3e393f6c8b78edca1c54fcf6d457e77198f5a
SHA2566573e399052a9db5580dbebfd53586cd6d1a2910435e1d743e43186e5d2b4ff9
SHA512630f482df4e19f80d462454196e042e66507a9ebf89ef9ea4e4f43e209d01a7860cd11131b24da08f00a3ef79d3b6ec02a698d738da70925d668a3599b0db06e