Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
3c92db2f3ebf668029fdc4292993cbe1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
3c92db2f3ebf668029fdc4292993cbe1.exe
Resource
win10v2004-20231023-en
General
-
Target
3c92db2f3ebf668029fdc4292993cbe1.exe
-
Size
2.6MB
-
MD5
3c92db2f3ebf668029fdc4292993cbe1
-
SHA1
7f1c43a22291617078a99e9582c452a5251513f6
-
SHA256
b486159228630e0fea177062ce127b00be242e7afe55d7a2fca2edcda81100f4
-
SHA512
afcb16c169da7619923d3213ab8ac0f2720054053fc8e181364cff3e09b97be22892f3129f827e9a0c197d0d84235ec6c7df3e17c499557f83365be1ea62edab
-
SSDEEP
24576:0z/hHpKYWs3wSciyJAPLBr+ZsxU/PbvCpDROhGdw+WKT6w9cTBK7hpFYhHAfCQn2:0z/XKlewS6N/PbW8C+Mdp2E58lA4
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4572 dosss.exe 3992 dosss.tmp -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4572 4784 3c92db2f3ebf668029fdc4292993cbe1.exe 94 PID 4784 wrote to memory of 4572 4784 3c92db2f3ebf668029fdc4292993cbe1.exe 94 PID 4784 wrote to memory of 4572 4784 3c92db2f3ebf668029fdc4292993cbe1.exe 94 PID 4572 wrote to memory of 3992 4572 dosss.exe 95 PID 4572 wrote to memory of 3992 4572 dosss.exe 95 PID 4572 wrote to memory of 3992 4572 dosss.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c92db2f3ebf668029fdc4292993cbe1.exe"C:\Users\Admin\AppData\Local\Temp\3c92db2f3ebf668029fdc4292993cbe1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\dosss.exe"C:\Users\Admin\AppData\Local\Temp\dosss.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\is-ML45S.tmp\dosss.tmp"C:\Users\Admin\AppData\Local\Temp\is-ML45S.tmp\dosss.tmp" /SL5="$401EC,2148280,486912,C:\Users\Admin\AppData\Local\Temp\dosss.exe"3⤵
- Executes dropped EXE
PID:3992
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5a1f6923e771b4ff0df9fec9555f97c65
SHA1545359cd68d0ee37f4b15e1a22c2c9a5fda69e22
SHA256928c2808421dfd487ffa697379548cbe682c0e13aeb595eb89973ba9c515b8a1
SHA512c9e54f48208151dcf60bf049d09a5c69f6ef7e4f046359fdfd50c61d49a6f9a37c3d3a2016d4beb70ae47270e9e9689e03064c02bee1e1d3d95998000e47f153
-
Filesize
2.7MB
MD5a1f6923e771b4ff0df9fec9555f97c65
SHA1545359cd68d0ee37f4b15e1a22c2c9a5fda69e22
SHA256928c2808421dfd487ffa697379548cbe682c0e13aeb595eb89973ba9c515b8a1
SHA512c9e54f48208151dcf60bf049d09a5c69f6ef7e4f046359fdfd50c61d49a6f9a37c3d3a2016d4beb70ae47270e9e9689e03064c02bee1e1d3d95998000e47f153
-
Filesize
1.5MB
MD5c6bffd4da620b07cb214f1bd8e7f21d2
SHA1054221dc0c8a686e0d17edd6e02c06458b1395c3
SHA25655dbb288d5df6df375487bae50661dbf530fd43a7e96017b7183a54db8fc376a
SHA51291e50df87a6e42b01e24accead25726047a641c3960fa3336f560168ed68356e6992d289a0a71b629d74ad7b00bbdbf7e6e909a4c8b5b1616fbf3b0cc63210ab