Analysis
-
max time kernel
120s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
1e6ce466f9906b169549ac2e62f73826.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e6ce466f9906b169549ac2e62f73826.exe
Resource
win10v2004-20231222-en
General
-
Target
1e6ce466f9906b169549ac2e62f73826.exe
-
Size
39KB
-
MD5
1e6ce466f9906b169549ac2e62f73826
-
SHA1
5c87eca8a5b90c83019f227053b388cf1ff3dc90
-
SHA256
9f6a4ef4268519e99d23638acd3e48cb52100f7c4db879cadf9c8cfb248a1747
-
SHA512
5f025d7ea8dd2e80d1507e9f6caf3bae868cb273462d9a38b89229d099672201b94ed27c8c2128664fec6efb84884012af69a7eb98b67d8c7f67a86504cf6ef6
-
SSDEEP
768:TiG10fWAnno/miA+D5MGFo9Nih/242OAWefnbk:GS0fHo/JftvFoHihOjWeI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3056 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2240 1e6ce466f9906b169549ac2e62f73826.exe 3056 rundll32.exe 3056 rundll32.exe 3056 rundll32.exe 3056 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\nettemp.dll 1e6ce466f9906b169549ac2e62f73826.exe File opened for modification C:\Windows\SysWOW64\directxsvi.dll 1e6ce466f9906b169549ac2e62f73826.exe File opened for modification C:\Windows\SysWOW64\sporder.dll 1e6ce466f9906b169549ac2e62f73826.exe File opened for modification C:\Windows\SysWOW64\sysconfig32.ax 1e6ce466f9906b169549ac2e62f73826.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28 PID 2240 wrote to memory of 3056 2240 1e6ce466f9906b169549ac2e62f73826.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e6ce466f9906b169549ac2e62f73826.exe"C:\Users\Admin\AppData\Local\Temp\1e6ce466f9906b169549ac2e62f73826.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe nettemp.dll,_DllSuicide@16 C:\Users\Admin\AppData\Local\Temp\1e6ce466f9906b169549ac2e62f73826.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:3056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD58148e962cee161fab139407f464fb56b
SHA1db84524879987dce9f1712931f99a985db16bb71
SHA2562b204b081163dd85828d29bdfe461997d41488131830ea5cfc4b609402cb53df
SHA5123df312ca48220084a9b392370261630f2894f92aa8494929fdb5af982846de1274196038535dfc8b13f4c5def8b66258c76606e5029ca082436d906849f0d578
-
Filesize
3KB
MD578cef9df5d20acb79ca276a25c67b968
SHA1284a2f23b4a9522910e0bc572016385b641a209c
SHA256958ac15b5a4485f9a7f99389d195c84323ab5973a9048e78a4dec3d9456abe16
SHA51276545ddf54da19b84e9bde7c44daedc20e87134a2b2b7f036890780e4527ee54b1e4b7a5c548f4c6832b032611cc464427dd1dc0055ebfc4ad32cf3009849b13
-
Filesize
14KB
MD51a68b96ff8b329926a3e50b02562aaba
SHA17b9a23330e9470d6629be83cb4e7ce098b58bf76
SHA2561d4423554b4ee112af67770bcf63d826c2aa06e92acf5007add59b0399d79aa3
SHA512f6af38f0ca0ff0f6cff8afecec253133b5ba100522d041f302137d5e647f23d825afec975d8b577df101f1534eff7e8afbfa17967ddcd6c1998f44339de0cef9