Analysis
-
max time kernel
105s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 07:44
Behavioral task
behavioral1
Sample
45d8ac1ac692d6bb0fe776620371fca02b60cac8db23c4cc7ab5df262da42b78.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
45d8ac1ac692d6bb0fe776620371fca02b60cac8db23c4cc7ab5df262da42b78.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
5b7ecf7e9d0715f1122baf4ce745c5fcd769dee48150616753fec4d6da16e99e.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
5b7ecf7e9d0715f1122baf4ce745c5fcd769dee48150616753fec4d6da16e99e.exe
Resource
win10v2004-20230220-en
General
-
Target
541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe
-
Size
6.3MB
-
MD5
aa4e99b717bcb7e916148a469e69788a
-
SHA1
42fc554d8442a78a48dc624d3de59ae4515eed6d
-
SHA256
541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219
-
SHA512
c6127eb47a24df060e8d81f95dd3fd4d0118b6fefbd38b25e6f23ac11f4ebdd0eecb61ddd79ef0cc9c4e52cdd36e823f99d5be389141f5ac9cead1b95d33f4ca
-
SSDEEP
98304:knDGGNXjcnVUySYboN7jREuF26pv9cYqVismqW:WN6Uy5kNaULel
Malware Config
Signatures
-
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3628 wrote to memory of 1176 3628 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe 82 PID 3628 wrote to memory of 1176 3628 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe 82 PID 1176 wrote to memory of 1244 1176 cmd.exe 83 PID 1176 wrote to memory of 1244 1176 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe"C:\Users\Admin\AppData\Local\Temp\541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\cmd.execmd /C "net use \\10.10.3.42\c$ 23AS32df21 /user:adm-karsair"2⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\net.exenet use \\10.10.3.42\c$ 23AS32df21 /user:adm-karsair3⤵PID:1244
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD581ddaa9009fe5e770202dd42ff5266c7
SHA1fbeed630d0da3ca9614e15a2da88efc159e66d01
SHA2567ee6cf77f6513897e1843cc50559f2f5d34dddfacd4c81449dda75022690a99e
SHA512a196ca4cbf5459deb23ff04bd9cf8bd2e5d1d3c963b027afed6733adec5e508ded8dd24cdd51fec1e7d14d2174f4bb7b4e04d787dc0f31438acbc10ef6dce8c3
-
Filesize
512B
MD555fe25f74951ab3800f3f58920216dd9
SHA1ebf6e06d7021f36c507581e0ce6f31be37214d48
SHA256786b80954876bb81381d5a68c6ded7d01836731577045173eb15a9f2935506fe
SHA5125627718f13f1be77bde5d88853904e93f0005d766ad84866401a58b545b47f534b014492a73ad8c9f4d4fe8b85de3be30769a68083a2758818f9ccdc14d816a5