Analysis
-
max time kernel
54s -
max time network
59s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/02/2023, 15:57
Static task
static1
Behavioral task
behavioral1
Sample
6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe
Resource
win10v2004-20221111-en
General
-
Target
6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe
-
Size
3.2MB
-
MD5
1f658ebbadd37adfe2be19aefcab5fb7
-
SHA1
265623f01ff9d7a5e0202e729d4940ab86076dd5
-
SHA256
6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529
-
SHA512
ae0e486de67b15bf3ff31d64e76345ec53e10e118552328c7ad046ebc11975fe14b475f99739b5eb4d7181fc9052cd8f63b435f5fa25937f99aba8fbf11ebfb8
-
SSDEEP
98304:fmB29k+lbV3mXTmL66qIWtylB4TW7iY0wHTZj:uB2pZNmDfIf0DY04
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 4832 rundll32.exe 3 4832 rundll32.exe 5 4832 rundll32.exe 6 4832 rundll32.exe 7 4832 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 4832 rundll32.exe 4832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1756 wrote to memory of 4832 1756 6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe 66 PID 1756 wrote to memory of 4832 1756 6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe 66 PID 1756 wrote to memory of 4832 1756 6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe"C:\Users\Admin\AppData\Local\Temp\6599b9f09779001d0f765426a4b421766305dcc0a99fa497dac8e1e0830ee529.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Eorppuwwrieiyod.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.2MB
MD5f1a52ffd7a15bd5e93e5f703594ce323
SHA14efe194d626f9ac5ea80c3ced2349074a518e48e
SHA2568c31936961b26f0d256ccdfc191dd7ff830761440dc08ffc10da9c6df7dd3aed
SHA5124109ce42e4def161d3f73fda8b3fff6aa1ec5fffd9dc0fb8e729c76b880e9851ddd72060778cfd2c776f37524c1937bf7b2a71cf1f1a9ccf859cc3e7dfc36ddf
-
Filesize
4.2MB
MD5f1a52ffd7a15bd5e93e5f703594ce323
SHA14efe194d626f9ac5ea80c3ced2349074a518e48e
SHA2568c31936961b26f0d256ccdfc191dd7ff830761440dc08ffc10da9c6df7dd3aed
SHA5124109ce42e4def161d3f73fda8b3fff6aa1ec5fffd9dc0fb8e729c76b880e9851ddd72060778cfd2c776f37524c1937bf7b2a71cf1f1a9ccf859cc3e7dfc36ddf
-
Filesize
4.2MB
MD5f1a52ffd7a15bd5e93e5f703594ce323
SHA14efe194d626f9ac5ea80c3ced2349074a518e48e
SHA2568c31936961b26f0d256ccdfc191dd7ff830761440dc08ffc10da9c6df7dd3aed
SHA5124109ce42e4def161d3f73fda8b3fff6aa1ec5fffd9dc0fb8e729c76b880e9851ddd72060778cfd2c776f37524c1937bf7b2a71cf1f1a9ccf859cc3e7dfc36ddf