Analysis
-
max time kernel
164s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 10:56
Static task
static1
Behavioral task
behavioral1
Sample
calc/calc/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
calc/calc/lpk.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
calc/calc/奖金计算器.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
calc/calc/奖金计算器.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
calc/calc/如果无法运行,请先安装.NET Framework.url
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
calc/calc/如果无法运行,请先安装.NET Framework.url
Resource
win10v2004-20221111-en
General
-
Target
calc/calc/lpk.dll
-
Size
46KB
-
MD5
77774d76e724ae9017bac8609947899c
-
SHA1
efd281c15cc901fee9c64f88fd0b74eb1fa82b57
-
SHA256
2017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
-
SHA512
68d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
SSDEEP
768:IUWUAohfjiT5ediDgEYe5eWomHEo2fKEFCLxu5qr7Ho73UEWkGpIfxMC:10qfWT5MbEYme9aLMBCVuEXID3x+C
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2292 hrl6254.tmp 1860 wokakm.exe -
resource yara_rule behavioral2/files/0x000700000002315f-135.dat upx behavioral2/files/0x000700000002315f-136.dat upx behavioral2/files/0x0006000000023164-137.dat upx behavioral2/files/0x0006000000023164-138.dat upx behavioral2/memory/2292-139-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1860-140-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2292-141-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1860-143-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1860 wokakm.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gei33.dll wokakm.exe File created C:\Windows\SysWOW64\wokakm.exe hrl6254.tmp File opened for modification C:\Windows\SysWOW64\wokakm.exe hrl6254.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4276 wrote to memory of 5024 4276 rundll32.exe 82 PID 4276 wrote to memory of 5024 4276 rundll32.exe 82 PID 4276 wrote to memory of 5024 4276 rundll32.exe 82 PID 5024 wrote to memory of 2292 5024 rundll32.exe 85 PID 5024 wrote to memory of 2292 5024 rundll32.exe 85 PID 5024 wrote to memory of 2292 5024 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\calc\calc\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\calc\calc\lpk.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\hrl6254.tmpC:\Users\Admin\AppData\Local\Temp\hrl6254.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2292
-
-
-
C:\Windows\SysWOW64\wokakm.exeC:\Windows\SysWOW64\wokakm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1860
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
46KB
MD577774d76e724ae9017bac8609947899c
SHA1efd281c15cc901fee9c64f88fd0b74eb1fa82b57
SHA2562017c37d13d1c5475cb1532f06a87ae60b1b5852a405a2b6c24d881efe7aba08
SHA51268d88ff7c3e130f2ac25e73ba92398dd2b8a6dba26980395996ed6c8e7a4a404de30ce40f9819925afe55040c8f69e6461b7f8349d8de5f2ccdf19116407699f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f
-
Filesize
33KB
MD51c5ff68d8d5bacf2524969da10883415
SHA13e3bd98a285bced519a81bd418a7a506e417c36e
SHA256686ce3c2b25244c8877d0e8db076055632039a55bba236843a5ef18e187feb0b
SHA512b10e5ae908f7e473f1314432227faa5e46615609384ebd4b82ccd3b1d5bc91d6e53662470a257e9f9c3c40983a081d609a7acae430edb0b6bfbe4fa30a89245f