Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
text.scr
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
text.scr
Resource
win10v2004-20231215-en
General
-
Target
text.scr
-
Size
76KB
-
MD5
9f273fb9b89bcaecc09740a08bb323f0
-
SHA1
e30028f0924770ce4ace3ab6360b7b79025f3356
-
SHA256
1b6ae6137baf03eaf2be42d5591381f2fe84d13111be5dd5b8d75dbfbfbc283f
-
SHA512
edd5777e4cc7249271d67eef40b8f89365725a23cbd0d2e12ba936738554302d4b6db1d9c7775ae999970ca21de90f17d47343e57bf26731009ffe3865494ade
-
SSDEEP
768:KhrjraNxlczzRHJ63AtecEoDecpJpDnxf6OC0conu4IO7migLV7NMDoLCSSSSSSr:KtOPSbjxlpfrgonuWmvntS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1704 taskgmrr.exe -
Loads dropped DLL 2 IoCs
pid Process 2052 text.scr 2052 text.scr -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskgmrr.exe text.scr File opened for modification C:\Windows\SysWOW64\taskgmrr.exe text.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1704 2052 text.scr 28 PID 2052 wrote to memory of 1704 2052 text.scr 28 PID 2052 wrote to memory of 1704 2052 text.scr 28 PID 2052 wrote to memory of 1704 2052 text.scr 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\text.scr"C:\Users\Admin\AppData\Local\Temp\text.scr" /S1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\taskgmrr.exeC:\Windows\system32\taskgmrr.exe2⤵
- Executes dropped EXE
PID:1704
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD59f273fb9b89bcaecc09740a08bb323f0
SHA1e30028f0924770ce4ace3ab6360b7b79025f3356
SHA2561b6ae6137baf03eaf2be42d5591381f2fe84d13111be5dd5b8d75dbfbfbc283f
SHA512edd5777e4cc7249271d67eef40b8f89365725a23cbd0d2e12ba936738554302d4b6db1d9c7775ae999970ca21de90f17d47343e57bf26731009ffe3865494ade