Analysis
-
max time kernel
104s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 23:40
Static task
static1
Behavioral task
behavioral1
Sample
a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe
Resource
win10v2004-20220812-en
General
-
Target
a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe
-
Size
272KB
-
MD5
2e412948e8541cb02991b004e3e0acd2
-
SHA1
141b34b508f2a4eda9b0aa286cba5c0ad22b3f36
-
SHA256
a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7
-
SHA512
49e89f629528f9c2ebe9f58fb2c9972fa4dfb7914bf49a214fb9bb7e18dc7f0cb5f2bdcde2c04613fcf5332b9fbcb2621e2c6f6cbae319abd1200d957f6982fb
-
SSDEEP
3072:pAZcT58MuJroX3fOcvoCqJ1vyidZxvltCxPt7yPkTsuZfI:pAZE589c9qzvy2TloDuPkwuZg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
thknzb.exepid process 520 thknzb.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1120 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1120 cmd.exe 1120 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.execmd.exedescription pid process target process PID 1480 wrote to memory of 1120 1480 a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe cmd.exe PID 1480 wrote to memory of 1120 1480 a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe cmd.exe PID 1480 wrote to memory of 1120 1480 a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe cmd.exe PID 1480 wrote to memory of 1120 1480 a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe cmd.exe PID 1120 wrote to memory of 520 1120 cmd.exe thknzb.exe PID 1120 wrote to memory of 520 1120 cmd.exe thknzb.exe PID 1120 wrote to memory of 520 1120 cmd.exe thknzb.exe PID 1120 wrote to memory of 520 1120 cmd.exe thknzb.exe PID 1120 wrote to memory of 1876 1120 cmd.exe PING.EXE PID 1120 wrote to memory of 1876 1120 cmd.exe PING.EXE PID 1120 wrote to memory of 1876 1120 cmd.exe PING.EXE PID 1120 wrote to memory of 1876 1120 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe"C:\Users\Admin\AppData\Local\Temp\a59b0fc794a2c4a56a989a5077e6fab8c213dedc5ba0deed812b905a1a8c43d7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\xunksyx.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\thknzb.exe"C:\Users\Admin\AppData\Local\Temp\thknzb.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\qbdnjc.batFilesize
188B
MD502962560814d1bfed1f9c41d29f18dd5
SHA1fa5c4ecb007212c0528b22f0189f1424a38bce32
SHA2567765207c6e4a52bdcafb81dcca19f370e1f593d5e2c77c0f680b36ceb86e5c83
SHA5122d6374bd757da8342d684c3c66e5b1b6807c47eb37108d6c9a56a59d28da968829819f7d5cacd88dea650de2358082ab749d3a8ea357304e965668ef555d92f8
-
C:\Users\Admin\AppData\Local\Temp\thknzb.exeFilesize
172KB
MD5c5c5bbb2cc4df671e3acd717c7c01582
SHA148d5743616648c3b51004737a5d406b30095e5b8
SHA2568940449b380e0888ca3a404b2508d810d162fb4d5769b92f723396893662887a
SHA51212e51ad62d076437d881561d90dd9f1ef5bbd9c388ab81e2bc075e7ce35b68b64a0e9880992df66fdcc3f3746768c8063c2ace2e88acea8a4775132fbb40b347
-
C:\Users\Admin\AppData\Local\Temp\thknzb.exeFilesize
172KB
MD5c5c5bbb2cc4df671e3acd717c7c01582
SHA148d5743616648c3b51004737a5d406b30095e5b8
SHA2568940449b380e0888ca3a404b2508d810d162fb4d5769b92f723396893662887a
SHA51212e51ad62d076437d881561d90dd9f1ef5bbd9c388ab81e2bc075e7ce35b68b64a0e9880992df66fdcc3f3746768c8063c2ace2e88acea8a4775132fbb40b347
-
C:\Users\Admin\AppData\Local\Temp\xunksyx.batFilesize
124B
MD5f903db46bc0fdec1dd3c9952fcd0d3f6
SHA1bdad8567ead8cf33b95497f702d522264ae89e01
SHA256fc0f046d1a713ee4c992d4c0321ead8f9968bee0fa264d9461f866922131f651
SHA51255f48a0c337211c4d8e555dfb8629a17d58a22b6e44440bf2d2cc52d4da7864d09062ee451b5f69970868784a9f3c8c45bc9a3fdacfc1d13343f8f7b2d5c79cd
-
\Users\Admin\AppData\Local\Temp\thknzb.exeFilesize
172KB
MD5c5c5bbb2cc4df671e3acd717c7c01582
SHA148d5743616648c3b51004737a5d406b30095e5b8
SHA2568940449b380e0888ca3a404b2508d810d162fb4d5769b92f723396893662887a
SHA51212e51ad62d076437d881561d90dd9f1ef5bbd9c388ab81e2bc075e7ce35b68b64a0e9880992df66fdcc3f3746768c8063c2ace2e88acea8a4775132fbb40b347
-
\Users\Admin\AppData\Local\Temp\thknzb.exeFilesize
172KB
MD5c5c5bbb2cc4df671e3acd717c7c01582
SHA148d5743616648c3b51004737a5d406b30095e5b8
SHA2568940449b380e0888ca3a404b2508d810d162fb4d5769b92f723396893662887a
SHA51212e51ad62d076437d881561d90dd9f1ef5bbd9c388ab81e2bc075e7ce35b68b64a0e9880992df66fdcc3f3746768c8063c2ace2e88acea8a4775132fbb40b347
-
memory/520-61-0x0000000000000000-mapping.dmp
-
memory/1120-55-0x0000000000000000-mapping.dmp
-
memory/1480-54-0x0000000076581000-0x0000000076583000-memory.dmpFilesize
8KB
-
memory/1876-64-0x0000000000000000-mapping.dmp