Analysis
-
max time kernel
37s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/04/2023, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe
Resource
win10v2004-20230220-en
General
-
Target
c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe
-
Size
1.6MB
-
MD5
ffdcae3b31803a83e3818714d343a975
-
SHA1
b52678a98201be08c5ce65c181a56f1959c8698c
-
SHA256
c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3
-
SHA512
e1ae4c98ccdbfe9dd2d234bda77c3098992512fcebb4e4e275e71359925ab5ac5bb11a52cd6d30903b3b910d962c967bda03e2eb40d73dfef7ff9d4c5e2e86bc
-
SSDEEP
24576:s7FUDowAyrTVE3U5F/8QD9Kic6QL3E2vVsjECUAQT45deRV9R4:sBuZrEUd5KIy029s4C1eH9W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 292 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp -
Loads dropped DLL 1 IoCs
pid Process 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 292 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27 PID 1552 wrote to memory of 292 1552 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe"C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp"C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp" /SL5="$90122,832512,832512,C:\Users\Admin\AppData\Local\Temp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp
Filesize3.1MB
MD59b2231506b2a97692f6b9683460880a0
SHA1226f72dcea4f8c3bfb0bb3dec4e63c2725170568
SHA256b1b015f3762b4b9bfce928401a3b13beee5fb70c989b97a03d57545fc00a1978
SHA5121b5be819d361fd2321b4407f1d5e56123b497848e2dfd337783b30fb9ab3c0f6a2abd7cb6ed03e3abf886ae47d76134f8d3f1f5b1de57056c6d8901dae533546
-
\Users\Admin\AppData\Local\Temp\is-46TA3.tmp\c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3.tmp
Filesize3.1MB
MD59b2231506b2a97692f6b9683460880a0
SHA1226f72dcea4f8c3bfb0bb3dec4e63c2725170568
SHA256b1b015f3762b4b9bfce928401a3b13beee5fb70c989b97a03d57545fc00a1978
SHA5121b5be819d361fd2321b4407f1d5e56123b497848e2dfd337783b30fb9ab3c0f6a2abd7cb6ed03e3abf886ae47d76134f8d3f1f5b1de57056c6d8901dae533546