Analysis
-
max time kernel
19s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 05:08
Static task
static1
Behavioral task
behavioral1
Sample
0f99e862c8db88bbc85a573eb665f6a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f99e862c8db88bbc85a573eb665f6a3.exe
Resource
win10v2004-20231222-en
General
-
Target
0f99e862c8db88bbc85a573eb665f6a3.exe
-
Size
21KB
-
MD5
0f99e862c8db88bbc85a573eb665f6a3
-
SHA1
6010851118b3ea3495daab4c86c79b4f7d09829b
-
SHA256
158235bd0d096bcfe730c3d51c3205b1a724cb7fb6792bbc771fddceed8dfff6
-
SHA512
413bd8fcef3e709bff8180ec70eba3f8e7868703bf2a08ac1ca58cc5a959ca67412254d4820d8f1f496ca5ad2432080f7b898320d3cb9ff4d1f1b29e7c243b46
-
SSDEEP
384:q7XZiECNtZLUNMcU71MWx4CpWwwoQhRZcLq0xmie5ioCSOHZYAUJMhFY:q7piEMLUNMKuWwwoQZ0a5BC/UJMhFY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 anymie360.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 2888 0f99e862c8db88bbc85a573eb665f6a3.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\anymie360.exe 0f99e862c8db88bbc85a573eb665f6a3.exe File created C:\Windows\SysWOW64\anymie360.exe 0f99e862c8db88bbc85a573eb665f6a3.exe File created C:\Windows\SysWOW64\anymie360.ini 0f99e862c8db88bbc85a573eb665f6a3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 2668 anymie360.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2668 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 30 PID 2888 wrote to memory of 2668 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 30 PID 2888 wrote to memory of 2668 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 30 PID 2888 wrote to memory of 2668 2888 0f99e862c8db88bbc85a573eb665f6a3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f99e862c8db88bbc85a573eb665f6a3.exe"C:\Users\Admin\AppData\Local\Temp\0f99e862c8db88bbc85a573eb665f6a3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\anymie360.exeC:\Windows\system32\anymie360.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD50f99e862c8db88bbc85a573eb665f6a3
SHA16010851118b3ea3495daab4c86c79b4f7d09829b
SHA256158235bd0d096bcfe730c3d51c3205b1a724cb7fb6792bbc771fddceed8dfff6
SHA512413bd8fcef3e709bff8180ec70eba3f8e7868703bf2a08ac1ca58cc5a959ca67412254d4820d8f1f496ca5ad2432080f7b898320d3cb9ff4d1f1b29e7c243b46