Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-11-2023 03:42
Behavioral task
behavioral1
Sample
wiperpayload.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
wiperpayload.exe
Resource
win10v2004-20231023-en
General
-
Target
wiperpayload.exe
-
Size
22.5MB
-
MD5
54d2582dd6f71c433134614d052754bf
-
SHA1
5497e3ee4b8251c2683c0e2ed1edc2bff4bffb8c
-
SHA256
8868de4d661e6cb6f2500d51b204b05ab827f29fc2599b9c523e5436b6849aaf
-
SHA512
3ccc9ce4eda22a3c6c88da1d55a1bbb0df7fa8c9b7d22cd7c191844c9a4f74041547a598e70539c2136c0192249668e383c8ffbe262fcc69632b354254aead57
-
SSDEEP
393216:vRvUWvMx8InEroXo2WtYjUaNRDHvcrwhvr+bUn2KekLTG/WViHjfEqirRRo5tN3r:lUpxXErUVfjrRj0r6+bUnonDwvstN3zX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1808 wiperpayload.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1808 2256 wiperpayload.exe 28 PID 2256 wrote to memory of 1808 2256 wiperpayload.exe 28 PID 2256 wrote to memory of 1808 2256 wiperpayload.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"C:\Users\Admin\AppData\Local\Temp\wiperpayload.exe"2⤵
- Loads dropped DLL
PID:1808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD57e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023
-
Filesize
4.3MB
MD57e9d14aa762a46bb5ebac14fbaeaa238
SHA1a5d90a7df9b90bdd8a84d7dc5066e4ea64ceb3d9
SHA256e456ef44b261f895a01efb52d26c7a0c7d7d465b647a7b5592708ebf693f12a3
SHA512280f16348df1c0953bbc6f37ff277485351171d0545ebe469bacd106d907917f87584154aec0f193f37322bc93ac5433cd9a5b5c7f47367176e5a8b19bbd5023