Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
3c92db2f3ebf668029fdc4292993cbe1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3c92db2f3ebf668029fdc4292993cbe1.exe
Resource
win10v2004-20231023-en
General
-
Target
3c92db2f3ebf668029fdc4292993cbe1.exe
-
Size
2.6MB
-
MD5
3c92db2f3ebf668029fdc4292993cbe1
-
SHA1
7f1c43a22291617078a99e9582c452a5251513f6
-
SHA256
b486159228630e0fea177062ce127b00be242e7afe55d7a2fca2edcda81100f4
-
SHA512
afcb16c169da7619923d3213ab8ac0f2720054053fc8e181364cff3e09b97be22892f3129f827e9a0c197d0d84235ec6c7df3e17c499557f83365be1ea62edab
-
SSDEEP
24576:0z/hHpKYWs3wSciyJAPLBr+ZsxU/PbvCpDROhGdw+WKT6w9cTBK7hpFYhHAfCQn2:0z/XKlewS6N/PbW8C+Mdp2E58lA4
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2696 dosss.exe 2912 dosss.tmp -
Loads dropped DLL 1 IoCs
pid Process 2696 dosss.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2104 wrote to memory of 2696 2104 3c92db2f3ebf668029fdc4292993cbe1.exe 29 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30 PID 2696 wrote to memory of 2912 2696 dosss.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c92db2f3ebf668029fdc4292993cbe1.exe"C:\Users\Admin\AppData\Local\Temp\3c92db2f3ebf668029fdc4292993cbe1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\dosss.exe"C:\Users\Admin\AppData\Local\Temp\dosss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\is-76A32.tmp\dosss.tmp"C:\Users\Admin\AppData\Local\Temp\is-76A32.tmp\dosss.tmp" /SL5="$70158,2148280,486912,C:\Users\Admin\AppData\Local\Temp\dosss.exe"3⤵
- Executes dropped EXE
PID:2912
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
2.7MB
MD5a1f6923e771b4ff0df9fec9555f97c65
SHA1545359cd68d0ee37f4b15e1a22c2c9a5fda69e22
SHA256928c2808421dfd487ffa697379548cbe682c0e13aeb595eb89973ba9c515b8a1
SHA512c9e54f48208151dcf60bf049d09a5c69f6ef7e4f046359fdfd50c61d49a6f9a37c3d3a2016d4beb70ae47270e9e9689e03064c02bee1e1d3d95998000e47f153
-
Filesize
2.7MB
MD5a1f6923e771b4ff0df9fec9555f97c65
SHA1545359cd68d0ee37f4b15e1a22c2c9a5fda69e22
SHA256928c2808421dfd487ffa697379548cbe682c0e13aeb595eb89973ba9c515b8a1
SHA512c9e54f48208151dcf60bf049d09a5c69f6ef7e4f046359fdfd50c61d49a6f9a37c3d3a2016d4beb70ae47270e9e9689e03064c02bee1e1d3d95998000e47f153
-
Filesize
1.5MB
MD5c6bffd4da620b07cb214f1bd8e7f21d2
SHA1054221dc0c8a686e0d17edd6e02c06458b1395c3
SHA25655dbb288d5df6df375487bae50661dbf530fd43a7e96017b7183a54db8fc376a
SHA51291e50df87a6e42b01e24accead25726047a641c3960fa3336f560168ed68356e6992d289a0a71b629d74ad7b00bbdbf7e6e909a4c8b5b1616fbf3b0cc63210ab
-
Filesize
1.5MB
MD5c6bffd4da620b07cb214f1bd8e7f21d2
SHA1054221dc0c8a686e0d17edd6e02c06458b1395c3
SHA25655dbb288d5df6df375487bae50661dbf530fd43a7e96017b7183a54db8fc376a
SHA51291e50df87a6e42b01e24accead25726047a641c3960fa3336f560168ed68356e6992d289a0a71b629d74ad7b00bbdbf7e6e909a4c8b5b1616fbf3b0cc63210ab