Analysis
-
max time kernel
25s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/06/2023, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
Gprinter_2022.2_M-1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Gprinter_2022.2_M-1.exe
Resource
win10v2004-20230220-en
General
-
Target
Gprinter_2022.2_M-1.exe
-
Size
71.8MB
-
MD5
7f6aceff0ad34b84873ffa29af91d5b5
-
SHA1
5d0512f632c21e8701a83fef396ea3ca908bb2b3
-
SHA256
4f4e3c2d48a52f6939c9ee42e6963766972f399a06ceb7739b236451249c3c5b
-
SHA512
68d03df3cf5cc78bc4bb9ddeb427b86c06a6baf8fa220a33089f9ee262b68f95ac2c5fda390d2813a23f7c06669ac416d33538d27271eb2555fbe9a4dd911a0c
-
SSDEEP
1572864:UpktxLPHw179gvYP0XanonPYq9ZlJ0LlVOhAxQqJwj2C/t++2wGzti3DDH5:UCxLPHc7qYP0WoPYi0yqj2wE33Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1636 __ExtractWizard.exe -
Loads dropped DLL 2 IoCs
pid Process 1136 Gprinter_2022.2_M-1.exe 1636 __ExtractWizard.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1636 1136 Gprinter_2022.2_M-1.exe 28 PID 1136 wrote to memory of 1636 1136 Gprinter_2022.2_M-1.exe 28 PID 1136 wrote to memory of 1636 1136 Gprinter_2022.2_M-1.exe 28 PID 1136 wrote to memory of 1636 1136 Gprinter_2022.2_M-1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Gprinter_2022.2_M-1.exe"C:\Users\Admin\AppData\Local\Temp\Gprinter_2022.2_M-1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\DP_18FE.tmp\__ExtractWizard.exe__ExtractWizard.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD54269ab24389067cbe12342e4d224e1a8
SHA1ebec9ebe0f405c4024e141c93c42458534df6045
SHA256005d3e989b47f5fa291408831cad66bc1f0577e15c1fe3be0c30d801b9d54e40
SHA51266006877a0855efc850f445d31336e857e19e67dbbe0041b01959f5774067f4fcacfb0d5b922dae0875342ce957cdb1e65d9b219e0d05ab7213a027e2db33d4a
-
Filesize
373KB
MD54269ab24389067cbe12342e4d224e1a8
SHA1ebec9ebe0f405c4024e141c93c42458534df6045
SHA256005d3e989b47f5fa291408831cad66bc1f0577e15c1fe3be0c30d801b9d54e40
SHA51266006877a0855efc850f445d31336e857e19e67dbbe0041b01959f5774067f4fcacfb0d5b922dae0875342ce957cdb1e65d9b219e0d05ab7213a027e2db33d4a
-
Filesize
186B
MD5f94be9a053743534aba0a6284476c150
SHA1e97ee5a15d8ef498d784be82dce0d2f3f5c80e86
SHA2569fa34124033cba817695edebe6106dce155a9f32ba295f21dc440f7b094d05bb
SHA5121f9207f3111f8a37d3c14e2a426f1cf5e03cb3ff159c48418159715adce6607983dec41431fa0e7870b93a3d13b90df212783adf504650c067ab9adc3a42df97
-
Filesize
37KB
MD590586eb1e95bd78e2f9d13c7e7a05240
SHA19c76d2c2ca25e22ebe30ecebc1ed8ca3d7fd21ba
SHA256f7c7851704068db0b32f712af8202402a5324971d36833fdc714cabf8313bf07
SHA5129d49b3c3ba8ad5136a20e37215d0645c5144dc60924ebd6ca74ef726fa099796c83bf8a4a08d39446c8abff5e6394945f873aad3beaea47599de9aeb09763f45
-
Filesize
189KB
MD55b49dfbc87bcfcfc432f39f3f3224df1
SHA11f8ee2b5c8b8be222c00b462023f2c0a93d826ca
SHA2566db0d04b3d220db80bc17c8d79879c9bf52800f963358b6ba5152a449f3c94bb
SHA5129915629fd1509f9f19b1fffb15adda1f6f97f2301c9c4d9ac9678f0335bb75593aed6fde35b42448c7e3ed4ca483c2eb869f243b18a11e325a6b7d1169b1d109
-
Filesize
373KB
MD54269ab24389067cbe12342e4d224e1a8
SHA1ebec9ebe0f405c4024e141c93c42458534df6045
SHA256005d3e989b47f5fa291408831cad66bc1f0577e15c1fe3be0c30d801b9d54e40
SHA51266006877a0855efc850f445d31336e857e19e67dbbe0041b01959f5774067f4fcacfb0d5b922dae0875342ce957cdb1e65d9b219e0d05ab7213a027e2db33d4a
-
Filesize
37KB
MD590586eb1e95bd78e2f9d13c7e7a05240
SHA19c76d2c2ca25e22ebe30ecebc1ed8ca3d7fd21ba
SHA256f7c7851704068db0b32f712af8202402a5324971d36833fdc714cabf8313bf07
SHA5129d49b3c3ba8ad5136a20e37215d0645c5144dc60924ebd6ca74ef726fa099796c83bf8a4a08d39446c8abff5e6394945f873aad3beaea47599de9aeb09763f45