Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2022 09:55
Behavioral task
behavioral1
Sample
Build.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Build.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
builder.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
keygen.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
keygen.exe
Resource
win10v2004-20221111-en
General
-
Target
Build.bat
-
Size
741B
-
MD5
4e46e28b2e61643f6af70a8b19e5cb1f
-
SHA1
804a1d0c4a280b18e778e4b97f85562fa6d5a4e6
-
SHA256
8e83a1727696ced618289f79674b97305d88beeeabf46bd25fc77ac53c1ae339
-
SHA512
009b17b515ff0ea612e54d8751eef07f1e2b54db07e6cd69a95e7adf775f3c79a0ea91bff2fe593f2314807fdc00c75d80f1807b7dbe90f0fcf94607e675047b
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1948 wrote to memory of 4252 1948 cmd.exe 81 PID 1948 wrote to memory of 4252 1948 cmd.exe 81 PID 1948 wrote to memory of 4252 1948 cmd.exe 81 PID 1948 wrote to memory of 4956 1948 cmd.exe 82 PID 1948 wrote to memory of 4956 1948 cmd.exe 82 PID 1948 wrote to memory of 4956 1948 cmd.exe 82 PID 1948 wrote to memory of 4928 1948 cmd.exe 83 PID 1948 wrote to memory of 4928 1948 cmd.exe 83 PID 1948 wrote to memory of 4928 1948 cmd.exe 83 PID 1948 wrote to memory of 4868 1948 cmd.exe 84 PID 1948 wrote to memory of 4868 1948 cmd.exe 84 PID 1948 wrote to memory of 4868 1948 cmd.exe 84 PID 1948 wrote to memory of 5056 1948 cmd.exe 85 PID 1948 wrote to memory of 5056 1948 cmd.exe 85 PID 1948 wrote to memory of 5056 1948 cmd.exe 85 PID 1948 wrote to memory of 1048 1948 cmd.exe 86 PID 1948 wrote to memory of 1048 1948 cmd.exe 86 PID 1948 wrote to memory of 1048 1948 cmd.exe 86 PID 1948 wrote to memory of 3284 1948 cmd.exe 87 PID 1948 wrote to memory of 3284 1948 cmd.exe 87 PID 1948 wrote to memory of 3284 1948 cmd.exe 87
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Build.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\keygen.exekeygen -path C:\Users\Admin\AppData\Local\Temp\Build -pubkey pub.key -privkey priv.key2⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type dec -privkey C:\Users\Admin\AppData\Local\Temp\Build\priv.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3Decryptor.exe2⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3.exe2⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -exe -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_pass.exe2⤵PID:4868
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32.dll2⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -dll -pass -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_Rundll32_pass.dll2⤵PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\builder.exebuilder -type enc -ref -pubkey C:\Users\Admin\AppData\Local\Temp\Build\pub.key -config config.json -ofile C:\Users\Admin\AppData\Local\Temp\Build\LB3_ReflectiveDll_DllMain.dll2⤵PID:3284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344B
MD53d41ef8aa13d752f03bfd9747db8bded
SHA1b987cccb178c02dbd4a8247c30cc30cc351a93a5
SHA256ae770527f8cefdbe9cacdc1367cccee971feeb768783b9f28808b9fc7ca4b7c8
SHA5127dd6a15609a457ce95b2d1c2d38e2503c6dcba638e0e1f98a32aad6347f203e68422fd1d8daee0416ae5076c738b33538e13f4f7cb235f63adbcdf3a80c12c30
-
Filesize
344B
MD5556a34d4a8255f886f4beccab999d625
SHA1acf46cc211973915ca699666c0b9a838a18484d2
SHA256293f6608b961c7ce11d067ff7b9d8886538a4029d97a736c620437aa3a980dfb
SHA5125a34596b4ce583d609b5b65f80f93b340157cd0d9cdc97264a7c19aa867d3587f4aedab01791bd78cdc893d0ad39afe144b84d3b28bdb3df220b8df56c751e07