Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 11:59
Behavioral task
behavioral1
Sample
WindowsEditor.exe
Resource
win7-20221111-en
General
-
Target
WindowsEditor.exe
-
Size
8.3MB
-
MD5
a01276baf7cab0051f9a7f6950754022
-
SHA1
875d179796dc7660b2f016f384958284f2ea0c67
-
SHA256
4273aa371116f56c43f5b840ffcf514bf970ca166b593a6884e57478c5da4283
-
SHA512
93a3aa034491c32ba68ebee715b467c5589e325b4c75490f2a5ea41b0d54f562c8b37ab92b17c32f984da336aed617b2e91ca41c90c2558a420933ceef0a9acb
-
SSDEEP
196608:I3pb7KX/HdN16B6yYnlPzf+JiT4n3XWKsMvtBVYP3hzHK:GYXPwBRYnlPSF3VvvtT4
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1320 WindowsEditor.exe -
resource yara_rule behavioral1/files/0x0008000000012326-57.dat upx behavioral1/files/0x0008000000012326-58.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1320 1472 WindowsEditor.exe 28 PID 1472 wrote to memory of 1320 1472 WindowsEditor.exe 28 PID 1472 wrote to memory of 1320 1472 WindowsEditor.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\WindowsEditor.exe"C:\Users\Admin\AppData\Local\Temp\WindowsEditor.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\WindowsEditor.exe"C:\Users\Admin\AppData\Local\Temp\WindowsEditor.exe"2⤵
- Loads dropped DLL
PID:1320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD553b1a9474ddc3a31adf72011dc8da780
SHA136f476d318acca6a12d3625b02cb14ab19534db7
SHA256357e545f47b605682328566a8df692dc22e4ea2ab37686788c3416b3813addc7
SHA512290c070eaf324476bfda676fc547ee42479a239b11192b654604862d53de1f1752a2f1b212dc15b3a22787a6469d6ec22ced98b7bb7d5f7c618602bbd12b7881
-
Filesize
1.6MB
MD553b1a9474ddc3a31adf72011dc8da780
SHA136f476d318acca6a12d3625b02cb14ab19534db7
SHA256357e545f47b605682328566a8df692dc22e4ea2ab37686788c3416b3813addc7
SHA512290c070eaf324476bfda676fc547ee42479a239b11192b654604862d53de1f1752a2f1b212dc15b3a22787a6469d6ec22ced98b7bb7d5f7c618602bbd12b7881