Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-07-2023 00:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
General
-
Target
file.exe
-
Size
1.7MB
-
MD5
95da0a6ddca2bebaee156d59a42756e7
-
SHA1
5c3336a4e0e80f03276d103c16d26633872906d3
-
SHA256
e458ae8f825198ef3a2f8e6290053826044dc6635e14dd25884acbf8d7196995
-
SHA512
62ca716a3b4fb6873eeef258281d3561347dd641f0cb0708ec6d88c525b83b3feca9702e17b17ef8aac60c3ae7ec3a0190734fa918087e22a355cd248c3729b9
-
SSDEEP
49152:P2YLzyLb+umRm50FRQUYRbIG+kPKgy7d8B6:OVmRkAG+KKgEd8B6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 file.exe.tmp -
Loads dropped DLL 4 IoCs
pid Process 2040 file.exe 2620 file.exe.tmp 2620 file.exe.tmp 2620 file.exe.tmp -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\FBSpacer719\is-8275E.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-SID4L.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-T5KAM.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-T8BEQ.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-IK5M1.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-CVIIT.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-7I04H.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-EVVSF.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-ISUCC.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-30NQA.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-18UVN.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-HV0HE.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-FVSNG.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-605OD.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-FHUL5.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-RF4A2.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Config\is-E2Q3I.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-GV1CK.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-LFUJB.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-HPNGE.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-FMH82.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-CHDSC.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-6LE6D.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-U7H9V.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-L5235.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-3QA95.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-5QV90.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-E9IIM.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Config\is-935F1.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-OPKGM.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-QVAB8.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-N6DRS.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-5NRKS.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-RBQLA.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-A1D2A.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-Q61LQ.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-GIGE2.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-6MP5J.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\unins000.dat file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-P9MG8.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-BSCHT.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-RQFG9.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-GF28H.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-I7MO7.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Config\is-7SISG.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Config\is-BR7SN.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-SI0P2.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-1RN7B.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-C1PHG.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-KLDDG.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-SKST9.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\is-O5M9N.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-F2J14.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-8UL3U.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-R6EOS.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-1B5MP.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Config\is-MQCCG.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-8G8RB.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-73EQV.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-MV3TC.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-965GR.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-SABO0.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-Q80BH.tmp file.exe.tmp File created C:\Program Files (x86)\FBSpacer719\Skins\Blue\is-P5UE1.tmp file.exe.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 file.exe.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28 PID 2040 wrote to memory of 2620 2040 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\is-7EVGT.tmp\file.exe.tmp"C:\Users\Admin\AppData\Local\Temp\is-7EVGT.tmp\file.exe.tmp" /SL5="$80120,1524245,54272,C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5ce494d2d223aed950fea67f657d3fa3e
SHA197a19c02487c41e3a079cd6764afffeb5e838b26
SHA256c8fa111c5b9537e3b6cab9ba763e164e27fa469f2232b82a54b206a7d892b9e9
SHA512687bf3bd7de28dc45ea622672dc59d7e45d9ce83530a7db6462447ea247a9bde061738c454e09b48531aab9cce802c8491aa730e4da65e63daf31c65ffc39fe1
-
Filesize
666KB
MD50e7f27cc46df2ce950edb562b443d15f
SHA10c5253dbfbccb7517811529679d4485d959829a5
SHA256610d949e936698934a293bcbca02aa66535cb92006a1629595d3b5439b44a87b
SHA512f74951340446e76244ebfe3ddb90c650de5849eeed27a37bc8fd1bb111be9543177b2e46ccef2a98c2044114ab56101491dd6cd08ac8b856535ac7e1cf425255
-
Filesize
666KB
MD50e7f27cc46df2ce950edb562b443d15f
SHA10c5253dbfbccb7517811529679d4485d959829a5
SHA256610d949e936698934a293bcbca02aa66535cb92006a1629595d3b5439b44a87b
SHA512f74951340446e76244ebfe3ddb90c650de5849eeed27a37bc8fd1bb111be9543177b2e46ccef2a98c2044114ab56101491dd6cd08ac8b856535ac7e1cf425255
-
Filesize
666KB
MD50e7f27cc46df2ce950edb562b443d15f
SHA10c5253dbfbccb7517811529679d4485d959829a5
SHA256610d949e936698934a293bcbca02aa66535cb92006a1629595d3b5439b44a87b
SHA512f74951340446e76244ebfe3ddb90c650de5849eeed27a37bc8fd1bb111be9543177b2e46ccef2a98c2044114ab56101491dd6cd08ac8b856535ac7e1cf425255
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3