Analysis
-
max time kernel
362s -
max time network
367s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 03:55
Static task
static1
Behavioral task
behavioral1
Sample
tvalue5-32-s-web.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tvalue5-32-s-web.exe
Resource
win10v2004-20230703-en
General
-
Target
tvalue5-32-s-web.exe
-
Size
9.4MB
-
MD5
f71ca9cb7ed32c860511372ad91ade5a
-
SHA1
67c69a668d6b5e2c2807a49a6eedfacbe9f60226
-
SHA256
eca828455222d63896c5462e5afb79cf36f616a58f4a1872b9cf4d0884b0999e
-
SHA512
c9cb59854484b92e2895ef11936d64443d2687e320db1e3998c51129418777b4a7045bdcb15a3453bad0a8f08fff827b02daf3cc9b83c08c753ad473a74e1ac3
-
SSDEEP
196608:LhT/ujMe6ds8fy1SCadAy/pFPuunO5IKD6CVLowsvyy:LAuv2JA9Duq+Ryyy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1756 GLBEC14.tmp -
Loads dropped DLL 3 IoCs
pid Process 2132 tvalue5-32-s-web.exe 1756 GLBEC14.tmp 1756 GLBEC14.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLBEC14.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30 PID 2132 wrote to memory of 1756 2132 tvalue5-32-s-web.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\tvalue5-32-s-web.exe"C:\Users\Admin\AppData\Local\Temp\tvalue5-32-s-web.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\GLBEC14.tmpC:\Users\Admin\AppData\Local\Temp\GLBEC14.tmp 6144 C:\Users\Admin\AppData\Local\Temp\TVALUE~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1756
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5c2ec390898bf33c5c21183cafb5f2cfb
SHA10acffb90fc0fd0db14953fd4646804c93bb84821
SHA256e5736220fdb92b596f8dc75affb23e593f8e1934f54705459f63ad05290ed80e
SHA5127f707edd7ebec2030c68499a6715ba46a82d00314f84428d249305e5e35729f0ad2f18c706a12f54965d418d2ba00249072c3a4e313eee206b0cc681a963e907
-
Filesize
70KB
MD5c2ec390898bf33c5c21183cafb5f2cfb
SHA10acffb90fc0fd0db14953fd4646804c93bb84821
SHA256e5736220fdb92b596f8dc75affb23e593f8e1934f54705459f63ad05290ed80e
SHA5127f707edd7ebec2030c68499a6715ba46a82d00314f84428d249305e5e35729f0ad2f18c706a12f54965d418d2ba00249072c3a4e313eee206b0cc681a963e907
-
Filesize
188KB
MD5b285c45a315f4e85a94962151c5f2b09
SHA1c0daee3a412678988fa1a9325c52cdca102e1711
SHA256739105d5981cdb3040a184c28f7d7bfaf0eabf2529fa81f5697cb7c42ba0e784
SHA512ed3ea4018fb1bd2859e8ebb74f0ab71f45096b687218ff748f6d581737385cc79b35940a2f6bbc2913d9ddec0902d168b5fd903729fce20ea83922bc4756d7b6
-
Filesize
33KB
MD5a1c931d551c1b8028c1843c03c370a7b
SHA172d6a8572a2e567b67a29ab7e04504517c15f583
SHA256494a7156cad54326177dc262a74c508da70982d9a0941932b105b4f25f7debff
SHA512d8837992ad0734aa7f18db58ba63f25b03369fe6e14718a476d9ea00f74de7f1c2d138dcce37b99c4ec2d6b9863bf3ec6125b3fd1e91a3b417a1e3176f33370d