Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
635efddbf3074cb116a6083b19fc7f60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
635efddbf3074cb116a6083b19fc7f60.exe
Resource
win10v2004-20231215-en
General
-
Target
635efddbf3074cb116a6083b19fc7f60.exe
-
Size
22KB
-
MD5
635efddbf3074cb116a6083b19fc7f60
-
SHA1
372d3acce35063e29d0a94477d53cd2b1cc73549
-
SHA256
899e2cae42cbe2cececf0a9b7b1d22c584d8da23f2fd886af28a84c26be962b8
-
SHA512
9fbb222a5d9b9248755e590d9c5b56aa1be405c4b0914e7b3b09345d6e22d79319b8a8c8fe810b974ca184d500574f3125dd67cf2a4a187cecaec63836e31113
-
SSDEEP
384:TMv0P2vDuhi7Y7f29acH7YVjQ9wMzDA1l+Aleei0RQu1enh2tAXvfyrVYsW6vKx8:zP2yY7YUwjTMHAP+Aleei0RQA+ZXvqrb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2500 Numeric32.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 635efddbf3074cb116a6083b19fc7f60.exe 2536 635efddbf3074cb116a6083b19fc7f60.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Numeric32.exe 635efddbf3074cb116a6083b19fc7f60.exe File created C:\Windows\SysWOW64\Numeric32.exe 635efddbf3074cb116a6083b19fc7f60.exe File created C:\Windows\SysWOW64\Numeric32.ini 635efddbf3074cb116a6083b19fc7f60.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 635efddbf3074cb116a6083b19fc7f60.exe 2500 Numeric32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2500 2536 635efddbf3074cb116a6083b19fc7f60.exe 28 PID 2536 wrote to memory of 2500 2536 635efddbf3074cb116a6083b19fc7f60.exe 28 PID 2536 wrote to memory of 2500 2536 635efddbf3074cb116a6083b19fc7f60.exe 28 PID 2536 wrote to memory of 2500 2536 635efddbf3074cb116a6083b19fc7f60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\635efddbf3074cb116a6083b19fc7f60.exe"C:\Users\Admin\AppData\Local\Temp\635efddbf3074cb116a6083b19fc7f60.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Numeric32.exeC:\Windows\system32\Numeric32.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5635efddbf3074cb116a6083b19fc7f60
SHA1372d3acce35063e29d0a94477d53cd2b1cc73549
SHA256899e2cae42cbe2cececf0a9b7b1d22c584d8da23f2fd886af28a84c26be962b8
SHA5129fbb222a5d9b9248755e590d9c5b56aa1be405c4b0914e7b3b09345d6e22d79319b8a8c8fe810b974ca184d500574f3125dd67cf2a4a187cecaec63836e31113