Analysis

  • max time kernel
    155s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/11/2022, 09:52

General

  • Target

    f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519.exe

  • Size

    16KB

  • MD5

    9e2c7f5b3d6dfee89c36b14825e33db5

  • SHA1

    d390dfc17bb4b90df03cb842e4ec10a5c7e41a6b

  • SHA256

    f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519

  • SHA512

    5ba3bf690e02c2ff1c3d36f3aca1f4fd0fc231d0c1aa33e5a95cff22eb942c1c7bffb327c2e4d043cbd2d16959171fdb1b73e9843995128b68c224230ee362a4

  • SSDEEP

    384:U93OPkSyyNmFfR0K9erK7Xo1WQEFlAtSeaJAslHkGrM:U93ukJyNmFfFeoY1WQEF2Da+D

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519.exe
    "C:\Users\Admin\AppData\Local\Temp\f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4884
    • C:\Windows\SysWOW64\lenyunsk.exe
      C:\Windows\system32\lenyunsk.exe ˜‰
      2⤵
      • Executes dropped EXE
      PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519.exe.bat
      2⤵
        PID:2728

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519.exe.bat

            Filesize

            246B

            MD5

            9e36869d34dd18ac0b62a7eda29041dc

            SHA1

            aa7a7482a9790c4fd1edeeb935d604edfae26b9b

            SHA256

            5ac6b356cca03de1fd3a790a409ba50067a756895c7c92fdfaf84b1b5e94b352

            SHA512

            9790c1b26713e5cd1adecc935b4886228e4433dff059ddb0acffb59e8e6d4037026d4f3cf9e958b7a3f7ae0e9072a69724652cc473ef6308018bb6750f2e57ae

          • C:\Windows\SysWOW64\lenyunsk.exe

            Filesize

            16KB

            MD5

            9e2c7f5b3d6dfee89c36b14825e33db5

            SHA1

            d390dfc17bb4b90df03cb842e4ec10a5c7e41a6b

            SHA256

            f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519

            SHA512

            5ba3bf690e02c2ff1c3d36f3aca1f4fd0fc231d0c1aa33e5a95cff22eb942c1c7bffb327c2e4d043cbd2d16959171fdb1b73e9843995128b68c224230ee362a4

          • C:\Windows\SysWOW64\lenyunsk.exe

            Filesize

            16KB

            MD5

            9e2c7f5b3d6dfee89c36b14825e33db5

            SHA1

            d390dfc17bb4b90df03cb842e4ec10a5c7e41a6b

            SHA256

            f2321f71072843517ef3a016d81facfbd9b511b9b557990e2e63bf69698fc519

            SHA512

            5ba3bf690e02c2ff1c3d36f3aca1f4fd0fc231d0c1aa33e5a95cff22eb942c1c7bffb327c2e4d043cbd2d16959171fdb1b73e9843995128b68c224230ee362a4

          • memory/2120-136-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/4884-135-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB