Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe
Resource
win10v2004-20240226-en
General
-
Target
4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe
-
Size
61KB
-
MD5
d650c9e024273a0f51ab7a35485a218f
-
SHA1
0e87d50d5dee0846f6319e7881cb4699cf5de76c
-
SHA256
4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42
-
SHA512
76404bbb1324032f611d7f60d0f26988137c422f28de36a35b1f84e2fe8f3059a408b9e54d734a27059ba89a54f9d95c15e0cc965118cd12ef0af1d2f990f911
-
SSDEEP
768:BeJIvFKPZo2smEasjcj29NWngAHxcwKppEaxglaX5uA:BQIvEPZo6Ead29NQgA2wzle5
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2204 ewiuer2.exe 1108 ewiuer2.exe 1392 ewiuer2.exe 1776 ewiuer2.exe 880 ewiuer2.exe -
Loads dropped DLL 10 IoCs
pid Process 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 2204 ewiuer2.exe 2204 ewiuer2.exe 1108 ewiuer2.exe 1108 ewiuer2.exe 1392 ewiuer2.exe 1392 ewiuer2.exe 1776 ewiuer2.exe 1776 ewiuer2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2204 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 28 PID 1544 wrote to memory of 2204 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 28 PID 1544 wrote to memory of 2204 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 28 PID 1544 wrote to memory of 2204 1544 4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe 28 PID 2204 wrote to memory of 1108 2204 ewiuer2.exe 32 PID 2204 wrote to memory of 1108 2204 ewiuer2.exe 32 PID 2204 wrote to memory of 1108 2204 ewiuer2.exe 32 PID 2204 wrote to memory of 1108 2204 ewiuer2.exe 32 PID 1108 wrote to memory of 1392 1108 ewiuer2.exe 33 PID 1108 wrote to memory of 1392 1108 ewiuer2.exe 33 PID 1108 wrote to memory of 1392 1108 ewiuer2.exe 33 PID 1108 wrote to memory of 1392 1108 ewiuer2.exe 33 PID 1392 wrote to memory of 1776 1392 ewiuer2.exe 35 PID 1392 wrote to memory of 1776 1392 ewiuer2.exe 35 PID 1392 wrote to memory of 1776 1392 ewiuer2.exe 35 PID 1392 wrote to memory of 1776 1392 ewiuer2.exe 35 PID 1776 wrote to memory of 880 1776 ewiuer2.exe 36 PID 1776 wrote to memory of 880 1776 ewiuer2.exe 36 PID 1776 wrote to memory of 880 1776 ewiuer2.exe 36 PID 1776 wrote to memory of 880 1776 ewiuer2.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe"C:\Users\Admin\AppData\Local\Temp\4d463cdb725712297ceffacec286b15ccef075094f5f21fae71c6a6b8da8fd42.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe6⤵
- Executes dropped EXE
PID:880
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225B
MD5e577d1f82df54681986074dc11c2f168
SHA14568b865db7e72821a88ea824ca4e7296f32ad8a
SHA256b5f19e888057cbb7ce935f9f278e821793bfeab7a5c8c0309b75aaab53721577
SHA5122af2d14f5069f141692db29198425838ec5fdcff297cf6c5491c52f4739f0f9d498dddbcc1f88a7a0c408d5245661990845bfaeb2e1d3a7e3b455303eee66479
-
Filesize
226B
MD5d19869b783dc6b0cac1c37ead0d63cc8
SHA11feed7679fcf77b7b642e48c7f4056c9e5d96289
SHA256d1c60598bac65d161dc8dd6a3297f53957e78a470256ce946fae8871526efed1
SHA51214ed44504c332dbcb9cd6ed79373b09bb85407064c0f07a5eb15a2c612f3f6f78a2ceffc499476a63433832981d543821d8e0701b861f62a6a936420d5f94a28
-
Filesize
61KB
MD542669343895ac3bf99efee5fa89cd154
SHA1965ccd10f7e2695e32918e5881781b75082c4c30
SHA2560c85cee420404639d685fec020bbe10e1fd6c47c22a7ebf5bc87006c726d2dc1
SHA51282078ce0e7341627c767464e1dedc8631cf140a63d74146331cb304f5f446b4debba474c30e18e7a28c65a4595789845956f4a9c566bbdf10e3d0d1aafae3223
-
Filesize
61KB
MD59ac8e9493e43f1cd81086a81edb2e5ae
SHA18c7917e411a08603cb82bfcca9a1d8372b4efe74
SHA256b0f8306f0934079b92136519ad04cd8e28708d089d546c37ef349aec08020f9e
SHA512f6901a6d2a8537cf4a0418855b33937933b6b475fbbec5a99b31ce97249daa1ac761ef15937647fd335ffd8ab30c591c514e90b32ab0f6caa014d37e7b47b94e
-
Filesize
61KB
MD5d41542e28bc37c8dd23459b78692b527
SHA14beaf8a1ed062d49f88d46bd2030ef3ee8ed13d1
SHA2566790f471d4394b48da157b64cefa00b368084c8d09fca635623dfc5d32d414c2
SHA512664095f8ce31494ad588c548bf311b280c8138113964f17355dfa8d53a540e10ed935af64e33850ee4c2cd9fbbe1052b22b0e1b0fd0d7430afc0f9a9a41242b2
-
Filesize
61KB
MD515e95c6b1e29f040a8d4e9884ff2f639
SHA1ff6e5e868ea69716fc9473a0492065af08664801
SHA256521f97a697e3f1ae7dacc403da57a6960833bcbcd97a05cca183098f71bd7750
SHA5127c348fd03c2567d94f9a9fd73ae16e034269c71f7ad5b7bdda738601e2073ed69f4418c7ff1d467d8604430fa138f3263159836a7fbd5f1406715e5da2db5e8d
-
Filesize
61KB
MD53a049cf18f9ca7a9b410e86ad1d88146
SHA15d1c69fe7089b3ba4cc9736774bc1ba01f41a745
SHA256c1f4e2e17d3c84fc4b97866d240ddd9a269c118aa2e90a7a6d65463f50e027bc
SHA5129358e7f5d672004eb5edf61442e49c3e14705b8e61b2bad0c54794a3e9c1ab4ac52e479c3785eb64841a48ce9ff7f91ad7a072a4f3184aaa24fde86fa0803546