Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 11:16
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
config.json
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
config.json
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
keygen.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
keygen.exe
Resource
win10v2004-20220812-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2260 wrote to memory of 5088 2260 cmd.exe 84 PID 2260 wrote to memory of 5088 2260 cmd.exe 84 PID 2260 wrote to memory of 5088 2260 cmd.exe 84 PID 2260 wrote to memory of 632 2260 cmd.exe 85 PID 2260 wrote to memory of 632 2260 cmd.exe 85 PID 2260 wrote to memory of 632 2260 cmd.exe 85 PID 2260 wrote to memory of 2772 2260 cmd.exe 86 PID 2260 wrote to memory of 2772 2260 cmd.exe 86 PID 2260 wrote to memory of 2772 2260 cmd.exe 86 PID 2260 wrote to memory of 1384 2260 cmd.exe 87 PID 2260 wrote to memory of 1384 2260 cmd.exe 87 PID 2260 wrote to memory of 1384 2260 cmd.exe 87 PID 2260 wrote to memory of 2540 2260 cmd.exe 88 PID 2260 wrote to memory of 2540 2260 cmd.exe 88 PID 2260 wrote to memory of 2540 2260 cmd.exe 88 PID 2260 wrote to memory of 3784 2260 cmd.exe 90 PID 2260 wrote to memory of 3784 2260 cmd.exe 90 PID 2260 wrote to memory of 3784 2260 cmd.exe 90 PID 2260 wrote to memory of 1580 2260 cmd.exe 91 PID 2260 wrote to memory of 1580 2260 cmd.exe 91 PID 2260 wrote to memory of 1580 2260 cmd.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:1580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD5d277ba5ee35365b05fa8bb0cedae050c
SHA100ae921d98c8f8317930b7fada9a98c68bc7b751
SHA256f2add1b8ab6d4f6e69a4412d9e5782fb1d20731d39b74637e15e026be3caa610
SHA512f43a9db8a8bd4364d40acd3bd8ae118040a0ea1b3979c04a4c02be87b991574f41c5996fff3b72bc736d7f93fb277e6b7f0f473f52a23719a7a0cffb10d34bae
-
Filesize
344B
MD5ce70bed8acffd9dcac7b5f25d29122de
SHA13755216a289c30acbf58c667d64fbe8bd4fbe0e5
SHA256bf0d61de11b5e2b69a606e74329d96bb573c29e6af54831be85efa60ca0c37fd
SHA512310a1f1fbd4a2049d246d1d408bc4dbee74b7be8318b4abf8dcf7f75c3c5bd798db3002225ec6fd753cb36724d4a73c13410138736cc1955fe1833621e9d3915