Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 22:50
Behavioral task
behavioral1
Sample
22db10b0bfc3914f33f4ae5213c39f10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
22db10b0bfc3914f33f4ae5213c39f10N.exe
Resource
win10v2004-20240709-en
General
-
Target
22db10b0bfc3914f33f4ae5213c39f10N.exe
-
Size
9.7MB
-
MD5
22db10b0bfc3914f33f4ae5213c39f10
-
SHA1
29799adb15b35061ed7b7b809033e2da71a4d1be
-
SHA256
c625604b530b58babdbad6b0a673e9b49bf9962024cb77089f2bc229355b9a84
-
SHA512
664bfa07175231f99a78bda5ee5d91f94d51a9380da2341e17daf8f75f054304cc4caa5f88ef04085332a28631f3ffd38c5125721ed2e0ffea0d5c52d69fc02e
-
SSDEEP
196608:drrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr5fffffffffffffffffffffffff:r
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1960 svrwsc.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0018000000005c50-4.dat upx behavioral1/memory/1960-5-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svrwsc.exe svrwsc.exe File created C:\Windows\SysWOW64\svrwsc.exe 22db10b0bfc3914f33f4ae5213c39f10N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22db10b0bfc3914f33f4ae5213c39f10N.exe"C:\Users\Admin\AppData\Local\Temp\22db10b0bfc3914f33f4ae5213c39f10N.exe"1⤵
- Drops file in System32 directory
PID:2220
-
C:\Windows\SysWOW64\svrwsc.exeC:\Windows\SysWOW64\svrwsc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1960
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.0MB
MD555b416687f770d86878a872db8d423ea
SHA1c5fd71437ad5f39fa5c83fabb1e057adea9a3872
SHA2566a12689a098595d64966e12be553eed1813945b627e12bdcb75b3f712c75c48a
SHA512d00ccb58b5963aeab00930d122b4aff6b79d53b17b22c5c14a382c9cf03879ed83cb1333cd802b6fb26952bb6f52ae33a3a5cdce342e8d410ab26d6b682680c0