Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
ExamSQL.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ExamSQL.exe
Resource
win10v2004-20240226-en
General
-
Target
ExamSQL.exe
-
Size
3.3MB
-
MD5
cf4b196fd69bb1b88e8f595266f5ee4b
-
SHA1
e32745ea62bd0e5a51b708ce3f6cca274aa972f2
-
SHA256
1e46a731327705d3e91323c7aeb9397ca5a961edfe9049e1bab41c7cc2cdee05
-
SHA512
ad3652095c29f91979c0bd684eb12971cdb27d41e8b4306d52252fe5d48124a14f2cccd519026c9e4c537342f518d4d142f215349b67b1ab05d4361dd557c306
-
SSDEEP
98304:hPBaBfBABf3w11DYG1a+A37zyoB3lLRBanHAHnVw:rOpMvw1Tor3yoB5zangm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 ExamSQL.exe 1740 setup.exe 1740 setup.exe 1740 setup.exe -
resource yara_rule behavioral1/files/0x000c00000001313a-4.dat upx behavioral1/memory/2236-5-0x0000000002060000-0x00000000020D1000-memory.dmp upx behavioral1/memory/1740-10-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral1/memory/1740-17-0x0000000000400000-0x0000000000471000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28 PID 2236 wrote to memory of 1740 2236 ExamSQL.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExamSQL.exe"C:\Users\Admin\AppData\Local\Temp\ExamSQL.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\ae2146\setup.exeC:\Users\Admin\AppData\Local\Temp\ae2146\setup.exe -d "C:\Users\Admin\AppData\Local\Temp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5121fd37caf8f1861f6056b137475fb72
SHA13318eb73e640183eb0d1cf59b56f3c835aed6797
SHA25675213b5e8dab60ca964ac418547712fcca76a49cc774095ed2c5a051c834fc56
SHA51227343c08b7adefde5672fb47736a95a307ecefd0fb6db219e1e2fa7304f87ca1d69f1d6df0aa1ccb1de885ca21499ad02b4e70095cc35857b8445ec5923a87d4
-
Filesize
4KB
MD5b02bab409baabb2f432a9deb588edc75
SHA1485b21647b8037864e35e4fa6fb268ba50883fd5
SHA256a00b95f9e9b0e3f7fb145eabd68be1688cab81adb399c23d8810ed0fc3e0293d
SHA512484c86c43a3a2e978e150b12cbf7948492a60aee49eff581574b5845d31c58998066dac8332ffd38ce1106778405e0cbd6622c8bf06b7877fa7c0ca777a9f17c
-
Filesize
149KB
MD5808e84852804a6a0a036edf798428f6c
SHA18b8923c86da2bd7fbe15bf8ec0178fa210b06e8e
SHA2562208362d112c755d569a03e28282b30dd53ddd79fe44dcde6ecad23ea82b37b2
SHA5129df79af8b7fd4945ffc58122063ba797b39a905f1665ce4c802a30bf8c721e1498296862fee0aa9291456aae0f6bc6634a5303ac22b336f927ba290c25b4ef6a