Overview
overview
7Static
static
1GlyceriaHa...ee.jpg
windows7-x64
3GlyceriaHa...ee.jpg
windows10-2004-x64
3Mainprizer...nd.lnk
windows7-x64
3Mainprizer...nd.lnk
windows10-2004-x64
3StanesBese...ly.cmd
windows7-x64
3StanesBese...ly.cmd
windows10-2004-x64
7StanesBese...ne.jpg
windows7-x64
3StanesBese...ne.jpg
windows10-2004-x64
3chuhraFond...ia.wsf
windows7-x64
3chuhraFond...ia.wsf
windows10-2004-x64
7chuhraFond...le.exe
windows7-x64
chuhraFond...le.exe
windows10-2004-x64
1Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 11:23
Static task
static1
Behavioral task
behavioral1
Sample
GlyceriaHaberdine/possessinglyBingee.jpg
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
GlyceriaHaberdine/possessinglyBingee.jpg
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
MainprizerMisapprehendSeastrand.lnk
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
MainprizerMisapprehendSeastrand.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
StanesBeseeches/Inquisitorially.cmd
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
StanesBeseeches/Inquisitorially.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
StanesBeseeches/Pseudoconhydrine.jpg
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
StanesBeseeches/Pseudoconhydrine.jpg
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
chuhraFondled/longeveEctocondyle/UndersortPodalgia.wsf
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
chuhraFondled/longeveEctocondyle/UndersortPodalgia.wsf
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
chuhraFondled/longeveEctocondyle/glycuresisPortionable.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
chuhraFondled/longeveEctocondyle/glycuresisPortionable.exe
Resource
win10v2004-20230220-en
General
-
Target
StanesBeseeches/Inquisitorially.cmd
-
Size
740B
-
MD5
d83d6ffcd16cbcd4870671952976fda8
-
SHA1
c0f7e6f54c94579518567032d1f4eed04955ba2d
-
SHA256
1fb1db9d2e48ed64b4fe840d2e54095638cb424cfc4d325c2ad4cb910eadc287
-
SHA512
7908f22f6dc1f4f977bcc92c901ba64fab7b31bd3eb74d58e2a0dd0dc2e7ef7cdfa3fbf017f7f04105ed637f489cb896a1b09003a2a198be16ae812b5e359377
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Mulmull.exeBassinet.exepid process 4896 Mulmull.exe 2696 Bassinet.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exedescription pid process target process PID 2976 wrote to memory of 380 2976 cmd.exe cmd.exe PID 2976 wrote to memory of 380 2976 cmd.exe cmd.exe PID 2976 wrote to memory of 4752 2976 cmd.exe xcopy.exe PID 2976 wrote to memory of 4752 2976 cmd.exe xcopy.exe PID 2976 wrote to memory of 4964 2976 cmd.exe cmd.exe PID 2976 wrote to memory of 4964 2976 cmd.exe cmd.exe PID 2976 wrote to memory of 4756 2976 cmd.exe xcopy.exe PID 2976 wrote to memory of 4756 2976 cmd.exe xcopy.exe PID 2976 wrote to memory of 4896 2976 cmd.exe Mulmull.exe PID 2976 wrote to memory of 4896 2976 cmd.exe Mulmull.exe PID 2976 wrote to memory of 2696 2976 cmd.exe Bassinet.exe PID 2976 wrote to memory of 2696 2976 cmd.exe Bassinet.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\StanesBeseeches\Inquisitorially.cmd"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"2⤵
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\\\\\\system32\\\\\\wscript.exe C:\Users\Admin\AppData\Local\Temp\Bassinet.exe /h /s /e2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"2⤵
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\\\\\\system32\\\\\\reg.exe C:\Users\Admin\AppData\Local\Temp\Mulmull.exe /h /s /e2⤵
-
C:\Users\Admin\AppData\Local\Temp\Mulmull.exeC:\Users\Admin\AppData\Local\Temp\Mulmull.exe import chuhraFondled\longeveEctocondyle\PoliticizationCanoeist.Ifs2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Bassinet.exeC:\Users\Admin\AppData\Local\Temp\Bassinet.exe chuhraFondled\longeveEctocondyle\UndersortPodalgia.wsf2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Bassinet.exeFilesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
C:\Users\Admin\AppData\Local\Temp\Bassinet.exeFilesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
C:\Users\Admin\AppData\Local\Temp\Mulmull.exeFilesize
75KB
MD5227f63e1d9008b36bdbcc4b397780be4
SHA1c0db341defa8ef40c03ed769a9001d600e0f4dae
SHA256c0e25b1f9b22de445298c1e96ddfcead265ca030fa6626f61a4a4786cc4a3b7d
SHA512101907b994d828c83587c483b4984f36caf728b766cb7a417b549852a6207e2a3fe9edc8eff5eeab13e32c4cf1417a3adccc089023114ea81974c5e6b355fed9