Analysis
-
max time kernel
175s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:26
Behavioral task
behavioral1
Sample
3333.exe
Resource
win7-20230621-en
General
-
Target
3333.exe
-
Size
4.6MB
-
MD5
10c4eb50adca0b5e5c38ae0fdfa422fc
-
SHA1
204fa092bd55f6c999733807115dbc5817fd2fa8
-
SHA256
4fb85146079a6ad27e94e913e2302d6a47f8f5409f55f174aecdd8c99ab372ed
-
SHA512
552fd54a83ba2bb2b64d25890aa1336ca397669fd3dbdf8bc64a3edc2bb4e71aa4207b54b09e3ca050acaf2d4cb4b56740b22152abd047e1627874a8ec968636
-
SSDEEP
49152:a/7FssC0KqUwzp+Z9vAaE5FKY/t764UzLUA/AOiyjrbsnnzvSn9rsPN/+9rjNvnT:K5sr4V+Zp4UzJ/TknzZ69XOY
Malware Config
Extracted
laplas
clipper.guru
-
api_key
b208717c54146010ab89e628591e2a7b11493ef1c593e7b3f15b1c06b1778d59
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3380 AlLpDBzutF.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1708 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 81 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2672 1620 3333.exe 92 PID 1620 wrote to memory of 2672 1620 3333.exe 92 PID 1620 wrote to memory of 2672 1620 3333.exe 92 PID 2672 wrote to memory of 1708 2672 cmd.exe 96 PID 2672 wrote to memory of 1708 2672 cmd.exe 96 PID 2672 wrote to memory of 1708 2672 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\3333.exe"C:\Users\Admin\AppData\Local\Temp\3333.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn xGCKbNsXzq /tr C:\Users\Admin\AppData\Roaming\xGCKbNsXzq\AlLpDBzutF.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn xGCKbNsXzq /tr C:\Users\Admin\AppData\Roaming\xGCKbNsXzq\AlLpDBzutF.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:1708
-
-
-
C:\Users\Admin\AppData\Roaming\xGCKbNsXzq\AlLpDBzutF.exeC:\Users\Admin\AppData\Roaming\xGCKbNsXzq\AlLpDBzutF.exe1⤵
- Executes dropped EXE
PID:3380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327.0MB
MD515f536ac1592250296938272fec5beec
SHA1c8d6033d00f1e5f89e722d8dda81a1a09939018a
SHA2564b9240db66fcf17e6f7c9b4615f10a8ccf682ec0029a921f06e4b43bbe23b55a
SHA512f1692825079dc4faaa6a465c719f3473affd21ad8b4760a8e0903e98c5e8be7b6b59a79461fdd7543de1ac0bb580b2cdd44e1bf392e87aec4559c045443bf543
-
Filesize
323.4MB
MD5be673861ae09c984f3f96def5d84006a
SHA1ab62af547d7007b46aa05089a0eb42f77742df70
SHA2565200d00a46bb9e733822c41e2e3769e65f715d8385d42de43d00b8db67b47601
SHA51232e084faded145d5a05d03eecb00405eca18e7f731ae65a0cbc284bb27319318e1aa1f3f7a98b1ec2d0449a923e31b22ea18edbb86427656767d2fa633b629db