Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 21:48
Behavioral task
behavioral1
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
cmd.exedescription pid process target process PID 4636 wrote to memory of 3196 4636 cmd.exe keygen.exe PID 4636 wrote to memory of 3196 4636 cmd.exe keygen.exe PID 4636 wrote to memory of 3196 4636 cmd.exe keygen.exe PID 4636 wrote to memory of 3544 4636 cmd.exe builder.exe PID 4636 wrote to memory of 3544 4636 cmd.exe builder.exe PID 4636 wrote to memory of 3544 4636 cmd.exe builder.exe PID 4636 wrote to memory of 4132 4636 cmd.exe builder.exe PID 4636 wrote to memory of 4132 4636 cmd.exe builder.exe PID 4636 wrote to memory of 4132 4636 cmd.exe builder.exe PID 4636 wrote to memory of 2756 4636 cmd.exe builder.exe PID 4636 wrote to memory of 2756 4636 cmd.exe builder.exe PID 4636 wrote to memory of 2756 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1688 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1688 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1688 4636 cmd.exe builder.exe PID 4636 wrote to memory of 828 4636 cmd.exe builder.exe PID 4636 wrote to memory of 828 4636 cmd.exe builder.exe PID 4636 wrote to memory of 828 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1844 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1844 4636 cmd.exe builder.exe PID 4636 wrote to memory of 1844 4636 cmd.exe builder.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Build\priv.keyFilesize
344B
MD59844125e309999a9e880ff2bb4e07066
SHA174cebd392abb7196bbb8e56a1e520fda84d850ac
SHA256de3a731befd37ee0e7c80a294f2e60a131f318d9de9e8878f05150f03f0d5507
SHA512c890412b7908bda24868dbd37827d5b2c078d6ee6e2a998550ed29af107ece16249361a76a380c9c081794f1ba9c4d393e6eec4496de47c4d83fa2e6b85d7f28
-
C:\Users\Admin\AppData\Local\Temp\Build\pub.keyFilesize
344B
MD5538e67c91ac9ee8b8480fa3552de00bf
SHA15fcd1944a59964e8b59f20acb5ed00c3ebf7c41c
SHA2569cd1836ad2ae866cdd37c1abfbd185e9fadc6d11166e0cbcb68bfbc199e123cd
SHA5123dba86b32e003415d14510f806f6bd3e3036fd848d12335af86245d540c415fe39aa310b1287001d7fc288e7e7077f33e4bf8e7616ec5df7e09affbc3daf56b5
-
memory/828-139-0x0000000000000000-mapping.dmp
-
memory/1688-138-0x0000000000000000-mapping.dmp
-
memory/1844-140-0x0000000000000000-mapping.dmp
-
memory/2756-137-0x0000000000000000-mapping.dmp
-
memory/3196-132-0x0000000000000000-mapping.dmp
-
memory/3544-133-0x0000000000000000-mapping.dmp
-
memory/4132-135-0x0000000000000000-mapping.dmp