Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe
Resource
win10v2004-20230915-en
General
-
Target
b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe
-
Size
6.7MB
-
MD5
c5e1e873a0d37c97791019b3179ab5e7
-
SHA1
c4ec77350137fb431b0e26ec8440fce2be7b979c
-
SHA256
b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99
-
SHA512
b6b3aa02ca4ab6be72b75cb66095704b6e5d78ff3ff48f08602e636620eea012f605351c88afae3c6233e3283c1f3dbb701633f15b8e4e56caa435a3ccc18f73
-
SSDEEP
98304:bE+alFbLmq8SbbuPlVJuHGj02nCaeKV8gIJBAUZL2C+:b1qL8lCG42deKS/JVo
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1280-1-0x00000000037F0000-0x0000000003814000-memory.dmp upx behavioral2/memory/1280-8-0x00000000037F0000-0x0000000003814000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1280 wrote to memory of 268 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 86 PID 1280 wrote to memory of 268 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 86 PID 1280 wrote to memory of 268 1280 b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe 86 PID 268 wrote to memory of 2344 268 cmd.exe 88 PID 268 wrote to memory of 2344 268 cmd.exe 88 PID 268 wrote to memory of 2344 268 cmd.exe 88 PID 268 wrote to memory of 4900 268 cmd.exe 89 PID 268 wrote to memory of 4900 268 cmd.exe 89 PID 268 wrote to memory of 4900 268 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe"C:\Users\Admin\AppData\Local\Temp\b5d87e2b885d42e48ebc02e710967afb9c25e126f7f78b97fecc27a2fca05e99.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo y|cacls C:\Users\Admin\AppData\Local\Temp\patcher\server\serverlist.txt /t /p everyone:f2⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵PID:2344
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Admin\AppData\Local\Temp\patcher\server\serverlist.txt /t /p everyone:f3⤵PID:4900
-
-