Analysis
-
max time kernel
142s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-04-2023 01:35
Static task
static1
Behavioral task
behavioral1
Sample
BrickHillSetup.exe
Resource
win7-20230220-en
General
-
Target
BrickHillSetup.exe
-
Size
1.6MB
-
MD5
085c248832ef03881059faec18eae7ff
-
SHA1
8477892aadc283f5d000b2c36e4c44c370f59727
-
SHA256
d755331262471b1c5fb7c47ad5e0e5129f8c103f3e5df06120b3f8db61c31aae
-
SHA512
80d3327168c4597554f441cf29360d9ae982bd36afa7e6409c6e2b779eddc7a522f2bdcd190a82517fb445bf7714377f30a79c2cedea168f19139d82cc94c43f
-
SSDEEP
24576:u4nXubIQGyxbPV0db26ifZbRQKiFDhbGh3+shiy/wxwWIFgi5LPxf0XE:uqe3f60oKil5QhiyPbFT9eE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2040 BrickHillSetup.tmp -
Loads dropped DLL 1 IoCs
pid Process 1212 BrickHillSetup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2040 BrickHillSetup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28 PID 1212 wrote to memory of 2040 1212 BrickHillSetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\BrickHillSetup.exe"C:\Users\Admin\AppData\Local\Temp\BrickHillSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\is-T7LSN.tmp\BrickHillSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-T7LSN.tmp\BrickHillSetup.tmp" /SL5="$7012A,810935,780288,C:\Users\Admin\AppData\Local\Temp\BrickHillSetup.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD57e06750376491b308c2a6e35eca13b1b
SHA136ae9cc7ac76bc97288ff1c36c4aef9cbb8b1e47
SHA256628a8a5e02456d23de8dec3a952f9e0ae3c464aa4a2ef884242e4486920828ac
SHA512a77e1d2917a5e77abb25732b056da980107550eb1e801c02f71db6c6941690fc20a4ee52700205d5c1d7f8a981b2b13c7fd6b79b582eeb1ce5f9c97f7e0ffea0
-
Filesize
3.0MB
MD57e06750376491b308c2a6e35eca13b1b
SHA136ae9cc7ac76bc97288ff1c36c4aef9cbb8b1e47
SHA256628a8a5e02456d23de8dec3a952f9e0ae3c464aa4a2ef884242e4486920828ac
SHA512a77e1d2917a5e77abb25732b056da980107550eb1e801c02f71db6c6941690fc20a4ee52700205d5c1d7f8a981b2b13c7fd6b79b582eeb1ce5f9c97f7e0ffea0