Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 02:06
Behavioral task
behavioral1
Sample
wiperpayload.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
wiperpayload.exe
Resource
win10v2004-20230915-en
General
-
Target
wiperpayload.exe
-
Size
22.7MB
-
MD5
61118d3cf190d53b95f36272b7512f65
-
SHA1
5b166d9e5027668ab1f707fe142320292a815523
-
SHA256
0b53edab42806eef4da3e3a0276ee9c296fc67cc4797ff806ce371e78270c401
-
SHA512
ecf60cf6aad81cae27427f67019f795c467e2f9dd152a3424f5b98a179e29f089c7a7032b2742454e6ab52a0031a4732a48e667890e090b3e30dc9dc155aa55c
-
SSDEEP
393216:VvUWv/HL2Vmo2WtYjUaNRDHvcrwhvr+bUn2KekLTH6mp/WViHW0Gzajaq3+d9Xg:RUYyVmVfjrRj0r6+bUno0fcElOd9XgWU
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
wiperpayload.exepid Process 2316 wiperpayload.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
wiperpayload.exedescription pid Process procid_target PID 2720 wrote to memory of 2316 2720 wiperpayload.exe 29 PID 2720 wrote to memory of 2316 2720 wiperpayload.exe 29 PID 2720 wrote to memory of 2316 2720 wiperpayload.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"2⤵
- Loads dropped DLL
PID:2316
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD52135da9f78a8ef80850fa582df2c7239
SHA1aac6ad3054de6566851cae75215bdeda607821c4
SHA256324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3
SHA512423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369
-
Filesize
4.3MB
MD52135da9f78a8ef80850fa582df2c7239
SHA1aac6ad3054de6566851cae75215bdeda607821c4
SHA256324963a39b8fd045ff634bb3271508dab5098b4d99e85e7648d0b47c32dc85c3
SHA512423b03990d6aa9375ce10e6b62ffdb7e1e2f20a62d248aac822eb9d973ae2bf35deddd2550a4a0e17c51ad9f1e4f86443ca8f94050e0986daa345d30181a2369