Analysis
-
max time kernel
1650s -
max time network
1710s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 19:33
Behavioral task
behavioral1
Sample
ScreenPayload.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ScreenPayload.exe
Resource
win10v2004-20231020-en
General
-
Target
ScreenPayload.exe
-
Size
1.0MB
-
MD5
1582506eba3220fdc1dc9254f7732c88
-
SHA1
80223f24b3edafd6723fe2000c3dfde614b2c941
-
SHA256
83174d98d25823f54699213c387f5cbec17493831608b924960e9276b147069c
-
SHA512
60cd1f0940818a6761efb002ac299755fd14324f068a606dd2fe19dc22d2476481a8c6d75999dd2b223917f9d2aba97b0598d2445de568c1b8b675aca0d6540c
-
SSDEEP
24576:qryL/PmBUqgdqt3qDYM9HFIm2BKX3yjCcy:qsmgdqt32lIm2BKX3Wx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 PixelateScrn.exe -
Loads dropped DLL 3 IoCs
pid Process 2332 cmd.exe 3068 PixelateScrn.exe 3068 PixelateScrn.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x0000000000518000-memory.dmp upx behavioral1/memory/2220-22-0x0000000000400000-0x0000000000518000-memory.dmp upx -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2332 2220 ScreenPayload.exe 29 PID 2220 wrote to memory of 2332 2220 ScreenPayload.exe 29 PID 2220 wrote to memory of 2332 2220 ScreenPayload.exe 29 PID 2220 wrote to memory of 2332 2220 ScreenPayload.exe 29 PID 2332 wrote to memory of 3068 2332 cmd.exe 30 PID 2332 wrote to memory of 3068 2332 cmd.exe 30 PID 2332 wrote to memory of 3068 2332 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ScreenPayload.exe"C:\Users\Admin\AppData\Local\Temp\ScreenPayload.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\588C.tmp\588D.tmp\588E.bat C:\Users\Admin\AppData\Local\Temp\ScreenPayload.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\PixelateScrn.exePixelateScrn3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30B
MD5d1713c63e86e160d2a94cc8ef320715e
SHA1c145c63b9cdab0a5fbdfd893215c0104ba9df97f
SHA25695ed71eae4e96071889f84aa429b6761f20d5478c373b7dc37ac0ebd3d1d2945
SHA5125db424d66f075c647dc15245e7609b7fa8e7ebbe95191c6d2e74bb7afddb9717dfc2da0ea560d3d73d2736aa009a6583139baac0c4305b0f02698761d52bff6e
-
Filesize
61KB
MD536615e65dcf875918732ff799462893b
SHA17fa4f9618d095b3430229d07fa1239912a805851
SHA256e5773d0edfd572b7e5fa0f049b6bccb6022d77e37cf5bf5393d8e9cf45c12c8f
SHA512aab184d01819615db9be8ce4138dbce7efbda1199806fe6b40ca5d5572b13608855c62b24d815bfbfae0f2134e47bbf6ae4db75e795464c677ee56333578661b
-
Filesize
171KB
MD56d47ca15e34ce5b3cd1a436226885aaa
SHA133825aec7b88b94ff2926ae367375fc814071b01
SHA256f31a44b466c4b6a11f104fd75c221bed775f8db2a6bb2a0d48409fa906a10e9e
SHA512587b467c052fe2cf7a6a59cd813b984f89510d68a6b8510497478bdd176e3d7d796e81acd13fb1ff52fa5a0bb0ac804c7a87bed01883252b1bfde0a4e5221426
-
Filesize
2.1MB
MD5e628baf3be74ffe67e71a27ca3865156
SHA105b75dee03400aea8812b9342e764e909667ebbd
SHA256b9921954681ceb3f01a03071f87aaa33116e0ab0a1532309dced36a0085471b7
SHA512d5e1a61bb98e35a996cf1d465bc6b922a0aac7d35713852dac43ec54cd34240dcf31d1843c4eed45c251dcde44399b7af1e0262c140577f148b3b706669cfd8e
-
Filesize
61KB
MD536615e65dcf875918732ff799462893b
SHA17fa4f9618d095b3430229d07fa1239912a805851
SHA256e5773d0edfd572b7e5fa0f049b6bccb6022d77e37cf5bf5393d8e9cf45c12c8f
SHA512aab184d01819615db9be8ce4138dbce7efbda1199806fe6b40ca5d5572b13608855c62b24d815bfbfae0f2134e47bbf6ae4db75e795464c677ee56333578661b
-
Filesize
2.1MB
MD5e628baf3be74ffe67e71a27ca3865156
SHA105b75dee03400aea8812b9342e764e909667ebbd
SHA256b9921954681ceb3f01a03071f87aaa33116e0ab0a1532309dced36a0085471b7
SHA512d5e1a61bb98e35a996cf1d465bc6b922a0aac7d35713852dac43ec54cd34240dcf31d1843c4eed45c251dcde44399b7af1e0262c140577f148b3b706669cfd8e
-
Filesize
171KB
MD56d47ca15e34ce5b3cd1a436226885aaa
SHA133825aec7b88b94ff2926ae367375fc814071b01
SHA256f31a44b466c4b6a11f104fd75c221bed775f8db2a6bb2a0d48409fa906a10e9e
SHA512587b467c052fe2cf7a6a59cd813b984f89510d68a6b8510497478bdd176e3d7d796e81acd13fb1ff52fa5a0bb0ac804c7a87bed01883252b1bfde0a4e5221426