Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
0a5726dd8968960fb92d826692542adf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a5726dd8968960fb92d826692542adf.exe
Resource
win10v2004-20231215-en
General
-
Target
0a5726dd8968960fb92d826692542adf.exe
-
Size
551KB
-
MD5
0a5726dd8968960fb92d826692542adf
-
SHA1
a900ea3730f7898c2ba66d121b612a75739aa2eb
-
SHA256
71ca949fe5ae3e604bc42cad9657022433d1045326017f0ab3aa7da83ace7d27
-
SHA512
152d389f03069548344be3850d8d12e62ff24bb257530de938bf880dc0ca1150cffc5683ff1c3d1685cf2b99e5cecaabd00af2c98027cba9990df027be656c21
-
SSDEEP
12288:AYynwbXvXjM4QKalFT2U0y0OZDdq02MGllERfxqv4mS:QCvXI532O0OGWRT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1244 idsec.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\idsec.exe 0a5726dd8968960fb92d826692542adf.exe File opened for modification C:\Windows\SysWOW64\idsec.exe 0a5726dd8968960fb92d826692542adf.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat 0a5726dd8968960fb92d826692542adf.exe File opened for modification C:\Windows\SysWOW64\idsec.exe idsec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 836 wrote to memory of 2028 836 0a5726dd8968960fb92d826692542adf.exe 29 PID 836 wrote to memory of 2028 836 0a5726dd8968960fb92d826692542adf.exe 29 PID 836 wrote to memory of 2028 836 0a5726dd8968960fb92d826692542adf.exe 29 PID 836 wrote to memory of 2028 836 0a5726dd8968960fb92d826692542adf.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5726dd8968960fb92d826692542adf.exe"C:\Users\Admin\AppData\Local\Temp\0a5726dd8968960fb92d826692542adf.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3704.bat2⤵
- Deletes itself
PID:2028
-
-
C:\Windows\SysWOW64\idsec.exeC:\Windows\SysWOW64\idsec.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1244
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD53fb56b5c9b12263e6d997c3a5e78c86b
SHA13d179af4fb5dc6f2c46d80981cafa1d7073831b6
SHA2565032ed1933fb6dbfee94373f9fd1697663770433473a9a50d09fb1c4c192b566
SHA5126d10059f8a6c3dd039ca7c91b0d8e664f09a1e8777deba0cdd04a88d41b14509131c48caf3ffc57de656e5892a15d77eea14527a5deb08ae8c6af6e2c83ebae5
-
Filesize
551KB
MD50a5726dd8968960fb92d826692542adf
SHA1a900ea3730f7898c2ba66d121b612a75739aa2eb
SHA25671ca949fe5ae3e604bc42cad9657022433d1045326017f0ab3aa7da83ace7d27
SHA512152d389f03069548344be3850d8d12e62ff24bb257530de938bf880dc0ca1150cffc5683ff1c3d1685cf2b99e5cecaabd00af2c98027cba9990df027be656c21
-
Filesize
227KB
MD544493537720b3aac8c3fe70ac4a127f7
SHA1653e06a4f117fd4b12228d82471dcdab8b3d5c4b
SHA25626d88c9b1bdcfbce4c5f37b301d27607e0831b2925ba478aa60d37e51dc86f30
SHA512bfe314fa83ed5754f590f679dc9baf74e6ebf640c6361a3cce49c6fca139bf5ea9523220ae1ac8cff379c5d98340eec7144daf36364ef974b042810ee09389e9