Analysis
-
max time kernel
78s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 08:54
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1868 wrote to memory of 4040 1868 cmd.exe 81 PID 1868 wrote to memory of 4040 1868 cmd.exe 81 PID 1868 wrote to memory of 4040 1868 cmd.exe 81 PID 1868 wrote to memory of 3344 1868 cmd.exe 82 PID 1868 wrote to memory of 3344 1868 cmd.exe 82 PID 1868 wrote to memory of 3344 1868 cmd.exe 82 PID 1868 wrote to memory of 4068 1868 cmd.exe 83 PID 1868 wrote to memory of 4068 1868 cmd.exe 83 PID 1868 wrote to memory of 4068 1868 cmd.exe 83 PID 1868 wrote to memory of 4816 1868 cmd.exe 84 PID 1868 wrote to memory of 4816 1868 cmd.exe 84 PID 1868 wrote to memory of 4816 1868 cmd.exe 84 PID 1868 wrote to memory of 4916 1868 cmd.exe 85 PID 1868 wrote to memory of 4916 1868 cmd.exe 85 PID 1868 wrote to memory of 4916 1868 cmd.exe 85 PID 1868 wrote to memory of 4872 1868 cmd.exe 86 PID 1868 wrote to memory of 4872 1868 cmd.exe 86 PID 1868 wrote to memory of 4872 1868 cmd.exe 86 PID 1868 wrote to memory of 5080 1868 cmd.exe 87 PID 1868 wrote to memory of 5080 1868 cmd.exe 87 PID 1868 wrote to memory of 5080 1868 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:3344
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:4068
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:5080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5e581f5b03f0829e513c03e2469e1a513
SHA1a52bb1d40ff8db2c79950c50d78ec2cec4525d58
SHA25635a4eef1759615e35eadf51dcbbacc6ed9b4005ee70db23ed83bda364ff18363
SHA512e9847dcbfd0c6aacc43e0787a95bbfe2b080ff05250d635b089349ac5695a4c71ed2f8b591be77b30f3bb255ff9f7acd0604ed117131b85d23f88ea83dad1c98
-
Filesize
344B
MD5e181ae9e976e8cd643289cca1780b475
SHA12df7c3157336da05c94ee80deb32ed24b7a9bd6b
SHA256c666bcfe1a214c4e5cd020ce81ef5bcfc16fad565bef8615c6e63f736b34a87b
SHA512566dc8a3997f6c1df91576c25f07813b2eb45f0df72d279e2382d317d03a279e6afa0543ce79ec11191aa3ee1ac0c73438bb22e2f6abf3911bf896e9e80afe71