Analysis
-
max time kernel
156s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 16:54
Static task
static1
Behavioral task
behavioral1
Sample
47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe
Resource
win7-20230831-en
General
-
Target
47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe
-
Size
5.8MB
-
MD5
52fe687ddad6e72d8c9f79b94543cb28
-
SHA1
ca3771cdc25a4c3618d6746d9bae20c8a0dc48c1
-
SHA256
47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017
-
SHA512
598fa486cae36ddcec368005b401da74c7c3a08586fd5995948bd9261bfadaa4d7eb4b9306bfdc99cdfc09fe93579164ba67dd090e3f6f0cc689bbdae586e8d7
-
SSDEEP
98304:dFMwKUb75oO8EL2TJgmgUiN+RJ/BC09WXSEKbSFa+UKiUsf+DltYg4:dFMwtPm/Em3x0cJ/BCmWzcKiXUltY
Malware Config
Extracted
laplas
45.159.188.158
-
api_key
d1a05de376c0be1daa56dfb2715c8a0c5df8a111b8b31decc886df1e48db7c9c
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1360 jGBsqiyHao.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 1360 jGBsqiyHao.exe 1360 jGBsqiyHao.exe 1360 jGBsqiyHao.exe 1360 jGBsqiyHao.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5068 wrote to memory of 940 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 92 PID 5068 wrote to memory of 940 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 92 PID 5068 wrote to memory of 940 5068 47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe 92 PID 940 wrote to memory of 2972 940 cmd.exe 94 PID 940 wrote to memory of 2972 940 cmd.exe 94 PID 940 wrote to memory of 2972 940 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe"C:\Users\Admin\AppData\Local\Temp\47c1302a6362defa7ae3e1d9f3f67059fc147677fdac70aa394583280ff54017.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.execmd.exe /C schtasks /create /tn GbXLuFISha /tr C:\Users\Admin\AppData\Roaming\GbXLuFISha\jGBsqiyHao.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn GbXLuFISha /tr C:\Users\Admin\AppData\Roaming\GbXLuFISha\jGBsqiyHao.exe /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2972
-
-
-
C:\Users\Admin\AppData\Roaming\GbXLuFISha\jGBsqiyHao.exeC:\Users\Admin\AppData\Roaming\GbXLuFISha\jGBsqiyHao.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25.8MB
MD5ff1273c9962541fb0cfca3e469f83a1e
SHA13ad025dfdb7a3838d7dd4b6398a8373a2ecd53a4
SHA256e1a4a263dae44bf0a703ab7b14756ac36d5a2e7fb066cb6a5b02e1feb6d4ab22
SHA5126cc39b2b4fcc759822db00e4c0ee5d2c816da0b77ffe5f3e080ec626f2cd707f0dd2b148eaaa5b527259defac5fa62eb39162de1c17ccc16c31251478071e7e3