Resubmissions
24-09-2022 09:21
220924-lbh5csahf7 10Analysis
-
max time kernel
61s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2022 09:21
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 812 wrote to memory of 2956 812 cmd.exe 81 PID 812 wrote to memory of 2956 812 cmd.exe 81 PID 812 wrote to memory of 2956 812 cmd.exe 81 PID 812 wrote to memory of 3592 812 cmd.exe 82 PID 812 wrote to memory of 3592 812 cmd.exe 82 PID 812 wrote to memory of 3592 812 cmd.exe 82 PID 812 wrote to memory of 3192 812 cmd.exe 83 PID 812 wrote to memory of 3192 812 cmd.exe 83 PID 812 wrote to memory of 3192 812 cmd.exe 83 PID 812 wrote to memory of 2604 812 cmd.exe 84 PID 812 wrote to memory of 2604 812 cmd.exe 84 PID 812 wrote to memory of 2604 812 cmd.exe 84 PID 812 wrote to memory of 3176 812 cmd.exe 85 PID 812 wrote to memory of 3176 812 cmd.exe 85 PID 812 wrote to memory of 3176 812 cmd.exe 85 PID 812 wrote to memory of 4488 812 cmd.exe 86 PID 812 wrote to memory of 4488 812 cmd.exe 86 PID 812 wrote to memory of 4488 812 cmd.exe 86 PID 812 wrote to memory of 4580 812 cmd.exe 87 PID 812 wrote to memory of 4580 812 cmd.exe 87 PID 812 wrote to memory of 4580 812 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:3192
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:4580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD52cf861a5be792a044277b220f88d1e2a
SHA1d0f2f0b07b34e3acb0fba0edb92f76aed7fcbae5
SHA25651f67a69d4b4b75808b7e07bf931d5e4dd1112541d471b42ad9a868eae4f1bfa
SHA512a7993bf28bb1863f854a5253008e463c7106d7dc0379d2f787eba5be8f06cdabaef7bded4aab45dd4a3fbe566c244a8b3afd9fbe4d665e1147f49c2677e682b7
-
Filesize
344B
MD503ebe2b097e7b9663d255f2b20222baa
SHA100b8b57cc04209b8e2c27e83f52f22074ec2a2f3
SHA2566d384597266488af718d4433bc02b31aa18293a6232c6ab8dc2a7d67d9b38823
SHA512ad355e435b3c2a2d3f9e45a93cc1a935e3710f96fa160f32b498195186b2a71f1eb63e71cfa665f138b4d785c76c69bae6ac9372cd5dcbbe57111e5c37b4f68c