Analysis
-
max time kernel
81s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01-07-2023 07:02
Behavioral task
behavioral1
Sample
CLEPexe.exe
Resource
win7-20230621-en
General
-
Target
CLEPexe.exe
-
Size
4.6MB
-
MD5
2b3bff5880cb5d9ab44c302bd1047313
-
SHA1
8cf83c7e71254a6ca5d40d58470897479c49e4c3
-
SHA256
e65f40ce3d58d2634807945b468acf0fbc3f6b06631d499dcd99536ed4fae4bc
-
SHA512
c3d46ca94eb85db7614f0c9ad57d5ab2afe380e5ae57b6967795d285936ee9133439010ddd3bd28267e203bb396062192cd3398092e2f37f46fa2be5aff426b4
-
SSDEEP
49152:l7LFs2B0KVUUzpyZ9vAaE5FKY/t76oUz7UQqAOiyjrbsnHzvSP9rsvl/m9NjJTnP:RpsC/VyZpoUzJqTknTRQdXOY
Malware Config
Extracted
laplas
clipper.guru
-
api_key
5ef1aac7b3430729f6cbc95fb4d2d2a62582e7382955ffc87026077cb28ab31e
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1140 MeWIPLCRzw.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1256 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 3 Go-http-client/1.1 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1244 1312 CLEPexe.exe 28 PID 1312 wrote to memory of 1244 1312 CLEPexe.exe 28 PID 1312 wrote to memory of 1244 1312 CLEPexe.exe 28 PID 1312 wrote to memory of 1244 1312 CLEPexe.exe 28 PID 1244 wrote to memory of 1256 1244 cmd.exe 30 PID 1244 wrote to memory of 1256 1244 cmd.exe 30 PID 1244 wrote to memory of 1256 1244 cmd.exe 30 PID 1244 wrote to memory of 1256 1244 cmd.exe 30 PID 1136 wrote to memory of 1140 1136 taskeng.exe 32 PID 1136 wrote to memory of 1140 1136 taskeng.exe 32 PID 1136 wrote to memory of 1140 1136 taskeng.exe 32 PID 1136 wrote to memory of 1140 1136 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\CLEPexe.exe"C:\Users\Admin\AppData\Local\Temp\CLEPexe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn FWDCznNyRu /tr C:\Users\Admin\AppData\Roaming\FWDCznNyRu\MeWIPLCRzw.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn FWDCznNyRu /tr C:\Users\Admin\AppData\Roaming\FWDCznNyRu\MeWIPLCRzw.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:1256
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {61E82902-4C43-4E26-B843-0F45D544E50D} S-1-5-21-1437583205-2177757337-340526699-1000:XVLNHWCX\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Roaming\FWDCznNyRu\MeWIPLCRzw.exeC:\Users\Admin\AppData\Roaming\FWDCznNyRu\MeWIPLCRzw.exe2⤵
- Executes dropped EXE
PID:1140
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
636.6MB
MD55e48552d90614f48cb912c1f7e1f6550
SHA1560ff82c3da3e28298b703a64ab4940869228fc1
SHA2568fe0fe2017a09213acfb9b5c0430fcc52742d947913d601600f45460646f8fac
SHA5127ef008ba13964a9346a813a7bcbbb8dd2896ae476000962bb4b5a5d981d138336fdcaf5ce02589efaf75c1aedd4b0d2af2e15395995dde2821c3460a20c6e1eb
-
Filesize
637.2MB
MD588ea1c5e123705edb211420d09dec84c
SHA17577df4c9134aad3c338cea1134b1d08abcfee4e
SHA2560eea40d57b35be57bc31e9423620e0dd907e40933ead0f648e560a82eb9ba8f4
SHA512b9ccf375929ddb62a69fd0cf083347b897028bd4e7b6f45baf9351e6dd7a04f8284742c83c2194d4d40e49b876c3c7713e7ffa94d43c330f0c96537d42287f44