Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15/02/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe
Resource
win10v2004-20221111-en
General
-
Target
e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe
-
Size
12.1MB
-
MD5
0784bfc4ba3aefc5e41676d06c64c955
-
SHA1
f97c4855b79684613f6045baa1cdbec2a15a7097
-
SHA256
e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb
-
SHA512
87d9e34da6d3cd04f10d31d5102201a392e3290745dbf991deb3b3e2ba01cf705e92feecc1e976b7663faa8961758d597efd7d93b3aa35e6ca5105e0b38ebef1
-
SSDEEP
196608:S8OcT6+O72bIhvAUJfSYoPie1ndP4Imp50MzzK7H4r2oWWI2HHSYGIA/Kg:SNc2bibjUQYmTnxDmp5VzzIH7o1yYKKg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp -
Loads dropped DLL 6 IoCs
pid Process 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp 1348 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26 PID 856 wrote to memory of 1348 856 e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe"C:\Users\Admin\AppData\Local\Temp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\is-N3LGD.tmp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp"C:\Users\Admin\AppData\Local\Temp\is-N3LGD.tmp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp" /SL5="$6012A,12378537,54272,C:\Users\Admin\AppData\Local\Temp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-N3LGD.tmp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp
Filesize900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f
-
Filesize
66KB
MD586a1311d51c00b278cb7f27796ea442e
SHA1ac08ac9d08f8f5380e2a9a65f4117862aa861a19
SHA256e916bdf232744e00cbd8d608168a019c9f41a68a7e8390aa48cfb525276c483d
SHA512129e4b8dd2665bcfc5e72b4585343c51127b5d027dbb0234291e7a197baeca1bab5ed074e65e5e8c969ee01f9f65cc52c9993037416de9bfff2f872e5aeba7ec
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
41KB
MD5aed41f94ae52180f1dfd2bdb4b0eca8b
SHA194d82dfeb59e35641cad3d0aef2bd78ee2fbde96
SHA256912518485d7d9f3c0ccdd4c154a67af0fa5daf0e802fc4a7db37cce80ec35c55
SHA51295c2f126ebc4b705359808dfa61bd98b60c5e8909a12f5be94f56c306620e331ecd12b4ce8074c7cd1dbdf2f5f79785a6d27274e6346120c2ac930d6748edbcd
-
Filesize
71KB
MD5028ccae315bc9860ded6dc52406fd961
SHA15715d8a868c868d45dd931253c460596d32985ec
SHA256455204bb7143ed3bc62c5d5f988fa2f6887ef0151458ceb5abd71cebb188892e
SHA5120f20c5f5b07d847f988835c7c8d9ccf0edb99d80329da562295811183bf651d48783e08c42adac78b532f3f3704a0d23da0a800cca9d6121428337f599440d7c
-
\Users\Admin\AppData\Local\Temp\is-N3LGD.tmp\e32e4fb7efb259c917b680c803017c4fbcb7102ae24383f105d6d2cec5560dcb.tmp
Filesize900KB
MD5f8b110dc2063d3b29502aa7042d26122
SHA11a0fd3db79eadc1ce714f6267d476ddbec0f5e79
SHA256e8730b0bf8f94cbb8babbfefb32cef8e8d19ec823f28c33a7d48c78589710762
SHA512f3125d3f575aff68105ebb3eadbce30547d34e12237d8ebbc555c6fe12bcc0a5ea85a38e26f2900d70af70ec07efde3b8cd65dc0fdada637496531245ea5052f