Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-09-2022 08:54
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
pid Process 968 keygen.exe 1832 builder.exe 1640 builder.exe 1636 builder.exe 1008 builder.exe 856 builder.exe 556 builder.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1064 wrote to memory of 968 1064 cmd.exe 28 PID 1064 wrote to memory of 968 1064 cmd.exe 28 PID 1064 wrote to memory of 968 1064 cmd.exe 28 PID 1064 wrote to memory of 968 1064 cmd.exe 28 PID 1064 wrote to memory of 1832 1064 cmd.exe 29 PID 1064 wrote to memory of 1832 1064 cmd.exe 29 PID 1064 wrote to memory of 1832 1064 cmd.exe 29 PID 1064 wrote to memory of 1832 1064 cmd.exe 29 PID 1064 wrote to memory of 1640 1064 cmd.exe 30 PID 1064 wrote to memory of 1640 1064 cmd.exe 30 PID 1064 wrote to memory of 1640 1064 cmd.exe 30 PID 1064 wrote to memory of 1640 1064 cmd.exe 30 PID 1064 wrote to memory of 1636 1064 cmd.exe 31 PID 1064 wrote to memory of 1636 1064 cmd.exe 31 PID 1064 wrote to memory of 1636 1064 cmd.exe 31 PID 1064 wrote to memory of 1636 1064 cmd.exe 31 PID 1064 wrote to memory of 1008 1064 cmd.exe 32 PID 1064 wrote to memory of 1008 1064 cmd.exe 32 PID 1064 wrote to memory of 1008 1064 cmd.exe 32 PID 1064 wrote to memory of 1008 1064 cmd.exe 32 PID 1064 wrote to memory of 856 1064 cmd.exe 33 PID 1064 wrote to memory of 856 1064 cmd.exe 33 PID 1064 wrote to memory of 856 1064 cmd.exe 33 PID 1064 wrote to memory of 856 1064 cmd.exe 33 PID 1064 wrote to memory of 556 1064 cmd.exe 34 PID 1064 wrote to memory of 556 1064 cmd.exe 34 PID 1064 wrote to memory of 556 1064 cmd.exe 34 PID 1064 wrote to memory of 556 1064 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:556
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD552c64d2b009c15abe8890e0aadf52692
SHA1c9243886857a9176374912d8afd2d9c541a58f13
SHA2564e8c8b2dfeb1824e49ae7c144cabf2d2a3039b68fb07ed22ca46dda24b4ba4f3
SHA512d59bb874d2b49e95c05307a19b6423e0a3097437b5ea6145b6c35bf1a45d850745dd27946f29463aba9c6bb3e5b731b3c939e8ac1f2375b329f4aefe46fb9b5d
-
Filesize
344B
MD530527fac5024d3cda3b6750f5fb5f0a4
SHA1bf7408320b05d85d36c82490d94ec4c17ed51f75
SHA25639abba5465935540c2ab030ec165731dff0129a7eb4d411dc71b266fdb5f82eb
SHA512303efa42a09b720fe5836961fe72cdda1364f863a848e95e77a69d7acd6a236bfcaa841c1e3de76a70d6c54a5d56a1cef1b1830e5aa73ad8abcec530fc8bee99