Analysis
-
max time kernel
151s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:05
Behavioral task
behavioral1
Sample
47d1043029c5a4ad3938d17df2c03a64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47d1043029c5a4ad3938d17df2c03a64.exe
Resource
win10v2004-20231222-en
General
-
Target
47d1043029c5a4ad3938d17df2c03a64.exe
-
Size
52KB
-
MD5
47d1043029c5a4ad3938d17df2c03a64
-
SHA1
b64a381209b865cc19c223fc810d6c735ac0a6d8
-
SHA256
8639dbd698c74a0904a9b89d15c477f1c2f84bb52c40464644780dd5e588e020
-
SHA512
ee436ba1fcb17e70367fa3ae6fbfcc31ac214cfb28d2ff3558163061ed7720003b1d009afa815dd49fc09644b63592b10f40b7322b93c52b61dc461224299033
-
SSDEEP
1536:jzCEbo8UnZr8FcgEfhBXZaiOAVUzcei09:Kt/PfQ
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000300000000b1f7-8.dat aspack_v212_v242 behavioral1/files/0x000300000000b1f7-46.dat aspack_v212_v242 behavioral1/memory/1724-49-0x0000000001ED0000-0x0000000001F12000-memory.dmp aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 2804 msniq.exe 2576 msniq.exe 1344 msniq.exe 2904 msniq.exe 1724 msniq.exe 2776 msniq.exe 2220 msniq.exe 2336 msniq.exe 444 msniq.exe 388 msniq.exe -
Loads dropped DLL 20 IoCs
pid Process 2972 47d1043029c5a4ad3938d17df2c03a64.exe 2972 47d1043029c5a4ad3938d17df2c03a64.exe 2804 msniq.exe 2804 msniq.exe 2576 msniq.exe 2576 msniq.exe 1344 msniq.exe 1344 msniq.exe 2904 msniq.exe 2904 msniq.exe 1724 msniq.exe 1724 msniq.exe 2776 msniq.exe 2776 msniq.exe 2220 msniq.exe 2220 msniq.exe 2336 msniq.exe 2336 msniq.exe 444 msniq.exe 444 msniq.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe 47d1043029c5a4ad3938d17df2c03a64.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe 47d1043029c5a4ad3938d17df2c03a64.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File opened for modification C:\Windows\SysWOW64\msniq.exe msniq.exe File created C:\Windows\SysWOW64\msniq.exe msniq.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2804 2972 47d1043029c5a4ad3938d17df2c03a64.exe 30 PID 2972 wrote to memory of 2804 2972 47d1043029c5a4ad3938d17df2c03a64.exe 30 PID 2972 wrote to memory of 2804 2972 47d1043029c5a4ad3938d17df2c03a64.exe 30 PID 2972 wrote to memory of 2804 2972 47d1043029c5a4ad3938d17df2c03a64.exe 30 PID 2804 wrote to memory of 2576 2804 msniq.exe 31 PID 2804 wrote to memory of 2576 2804 msniq.exe 31 PID 2804 wrote to memory of 2576 2804 msniq.exe 31 PID 2804 wrote to memory of 2576 2804 msniq.exe 31 PID 2576 wrote to memory of 1344 2576 msniq.exe 32 PID 2576 wrote to memory of 1344 2576 msniq.exe 32 PID 2576 wrote to memory of 1344 2576 msniq.exe 32 PID 2576 wrote to memory of 1344 2576 msniq.exe 32 PID 1344 wrote to memory of 2904 1344 msniq.exe 33 PID 1344 wrote to memory of 2904 1344 msniq.exe 33 PID 1344 wrote to memory of 2904 1344 msniq.exe 33 PID 1344 wrote to memory of 2904 1344 msniq.exe 33 PID 2904 wrote to memory of 1724 2904 msniq.exe 34 PID 2904 wrote to memory of 1724 2904 msniq.exe 34 PID 2904 wrote to memory of 1724 2904 msniq.exe 34 PID 2904 wrote to memory of 1724 2904 msniq.exe 34 PID 1724 wrote to memory of 2776 1724 msniq.exe 35 PID 1724 wrote to memory of 2776 1724 msniq.exe 35 PID 1724 wrote to memory of 2776 1724 msniq.exe 35 PID 1724 wrote to memory of 2776 1724 msniq.exe 35 PID 2776 wrote to memory of 2220 2776 msniq.exe 36 PID 2776 wrote to memory of 2220 2776 msniq.exe 36 PID 2776 wrote to memory of 2220 2776 msniq.exe 36 PID 2776 wrote to memory of 2220 2776 msniq.exe 36 PID 2220 wrote to memory of 2336 2220 msniq.exe 37 PID 2220 wrote to memory of 2336 2220 msniq.exe 37 PID 2220 wrote to memory of 2336 2220 msniq.exe 37 PID 2220 wrote to memory of 2336 2220 msniq.exe 37 PID 2336 wrote to memory of 444 2336 msniq.exe 38 PID 2336 wrote to memory of 444 2336 msniq.exe 38 PID 2336 wrote to memory of 444 2336 msniq.exe 38 PID 2336 wrote to memory of 444 2336 msniq.exe 38 PID 444 wrote to memory of 388 444 msniq.exe 39 PID 444 wrote to memory of 388 444 msniq.exe 39 PID 444 wrote to memory of 388 444 msniq.exe 39 PID 444 wrote to memory of 388 444 msniq.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\47d1043029c5a4ad3938d17df2c03a64.exe"C:\Users\Admin\AppData\Local\Temp\47d1043029c5a4ad3938d17df2c03a64.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 500 "C:\Users\Admin\AppData\Local\Temp\47d1043029c5a4ad3938d17df2c03a64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 516 "C:\Windows\SysWOW64\msniq.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 524 "C:\Windows\SysWOW64\msniq.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 508 "C:\Windows\SysWOW64\msniq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 540 "C:\Windows\SysWOW64\msniq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 512 "C:\Windows\SysWOW64\msniq.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 528 "C:\Windows\SysWOW64\msniq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 520 "C:\Windows\SysWOW64\msniq.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 536 "C:\Windows\SysWOW64\msniq.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\msniq.exeC:\Windows\system32\msniq.exe 532 "C:\Windows\SysWOW64\msniq.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:388
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD547d1043029c5a4ad3938d17df2c03a64
SHA1b64a381209b865cc19c223fc810d6c735ac0a6d8
SHA2568639dbd698c74a0904a9b89d15c477f1c2f84bb52c40464644780dd5e588e020
SHA512ee436ba1fcb17e70367fa3ae6fbfcc31ac214cfb28d2ff3558163061ed7720003b1d009afa815dd49fc09644b63592b10f40b7322b93c52b61dc461224299033