Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 18:13
Behavioral task
behavioral1
Sample
16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe
Resource
win10v2004-20230915-en
General
-
Target
16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe
-
Size
3.4MB
-
MD5
79e60cdd9aaf719f8996e5539f3815e9
-
SHA1
988d1284127c1438a21162990fa4c95ded50c895
-
SHA256
16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b
-
SHA512
72a3cef43343d8ee94073e690d8b7b3457a7dcfe7a6a905eeb802a5a3b6224658c5e2b2452543bbe95a7c0351f86d57f69c2ca766a014799502ba7728456bf78
-
SSDEEP
98304:R66IK03OY1qMb1tMugczILTrmAppQ3nXJ25t13uIwd:RdFxEtMugZFppQ3Xk5uIw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2756-0-0x0000000000400000-0x0000000000B2E000-memory.dmp upx behavioral2/memory/2756-12-0x0000000000400000-0x0000000000B2E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\minybr = "C:\\ProgramData\\kages\\minybr.exe" reg.exe -
Kills process with taskkill 1 IoCs
pid Process 2716 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2716 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2756 16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe 2756 16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2756 wrote to memory of 4608 2756 16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe 86 PID 2756 wrote to memory of 4608 2756 16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe 86 PID 2756 wrote to memory of 4608 2756 16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe 86 PID 4608 wrote to memory of 3036 4608 cmd.exe 88 PID 4608 wrote to memory of 3036 4608 cmd.exe 88 PID 4608 wrote to memory of 3036 4608 cmd.exe 88 PID 4608 wrote to memory of 3324 4608 cmd.exe 89 PID 4608 wrote to memory of 3324 4608 cmd.exe 89 PID 4608 wrote to memory of 3324 4608 cmd.exe 89 PID 4608 wrote to memory of 2716 4608 cmd.exe 90 PID 4608 wrote to memory of 2716 4608 cmd.exe 90 PID 4608 wrote to memory of 2716 4608 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe"C:\Users\Admin\AppData\Local\Temp\16b3d7d10faf1658124980271d4983aee754c9e263318b914ab2142c865fb26b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData/kages\1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:3036
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v minybr /t reg_sz /d "C:\ProgramData\kages\minybr.exe"3⤵
- Adds Run key to start application
PID:3324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250B
MD58440ecc26a2e2eaf69e19e9839cb5d7b
SHA1709e5c3859831ebc958d4ad20bfc17c8520d0d64
SHA2560beacdad8275242552393bc020aa510b86a01a2432befac6325df5e9cab59645
SHA512ab698534aabf3af4989fa703c71884f650842b35f072acc03f69c3bd33d1b9bc2bead0da501a12a5863e6925f3fc0d7aa367680988d97b2af57f5dd02ae2f460