Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 08:57
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4760 4772 cmd.exe 81 PID 4772 wrote to memory of 4760 4772 cmd.exe 81 PID 4772 wrote to memory of 4760 4772 cmd.exe 81 PID 4772 wrote to memory of 4720 4772 cmd.exe 82 PID 4772 wrote to memory of 4720 4772 cmd.exe 82 PID 4772 wrote to memory of 4720 4772 cmd.exe 82 PID 4772 wrote to memory of 4744 4772 cmd.exe 83 PID 4772 wrote to memory of 4744 4772 cmd.exe 83 PID 4772 wrote to memory of 4744 4772 cmd.exe 83 PID 4772 wrote to memory of 4632 4772 cmd.exe 84 PID 4772 wrote to memory of 4632 4772 cmd.exe 84 PID 4772 wrote to memory of 4632 4772 cmd.exe 84 PID 4772 wrote to memory of 1640 4772 cmd.exe 85 PID 4772 wrote to memory of 1640 4772 cmd.exe 85 PID 4772 wrote to memory of 1640 4772 cmd.exe 85 PID 4772 wrote to memory of 4192 4772 cmd.exe 86 PID 4772 wrote to memory of 4192 4772 cmd.exe 86 PID 4772 wrote to memory of 4192 4772 cmd.exe 86 PID 4772 wrote to memory of 3508 4772 cmd.exe 87 PID 4772 wrote to memory of 3508 4772 cmd.exe 87 PID 4772 wrote to memory of 3508 4772 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:4760
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:4744
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:4192
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:3508
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD506ea004d1a837409185f8c466ee164a3
SHA10ef9370b36a4f1b8b72d547ce6757374cd39035c
SHA256aaa934b3374fae9261266acde24ac789520f3820bf2c4451492fe93aad8e9185
SHA5120ee5a2b49743ac8aa2fe332b4dadd98c4c23ff6046f6ad0fcadde120b71e374ef2f5b52fb27aba3908ffc583ddf4c68b6efaa183c4b13ec806ccf108de512ff8
-
Filesize
344B
MD534c0d111e3733f9c4fac39c727a2dc4f
SHA118026aff3d8acf94b2a52d75592e4ad908cc320b
SHA256b078816093e94e75952d6ff846d4b6d09faed44ede4620aca17c8d74650946ab
SHA512404ea13cfcf59b80845b94beb22d2e926bfa056fbe815653950e63932248c8032ca93eb0509fd09cee4d64f02cffd88796049b93ea2812b433ab19116a386a36