Resubmissions
05/04/2024, 15:05
240405-sf5bqaff88 1027/11/2023, 17:10
231127-vpqk2aae84 827/11/2023, 16:30
231127-tzsbyahg8y 7Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
launcher.bat
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
launcher.bat
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
version1.dll
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
version1.dll
Resource
win10v2004-20231023-en
General
-
Target
launcher.bat
-
Size
62B
-
MD5
7d6b98d6fea6b32c98e4f6acb8930efe
-
SHA1
cf4689c45b1bd398ce2cf2f5c399c007166de257
-
SHA256
76ce2f0f4ac28eb39f4f06a15defec3b7a2eb4c4a55c05fa86535b1a3cdabc23
-
SHA512
35a9c5517b8e1a97bd02de5088e26050485aacd50783366f3b513b84c0886eff42d19fc8ba5369602755a3e6ed2bb5b02af50cc2f7a1b8406eba21e6f296539c
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4040 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 748 rundll32.exe 748 rundll32.exe 748 rundll32.exe 748 rundll32.exe 4040 rundll32.exe 4040 rundll32.exe 4040 rundll32.exe 4040 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3924 wrote to memory of 748 3924 cmd.exe 84 PID 3924 wrote to memory of 748 3924 cmd.exe 84 PID 748 wrote to memory of 4040 748 rundll32.exe 91 PID 748 wrote to memory of 4040 748 rundll32.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\rundll32.exerundll32.exe version1.dll, scab2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\Custom_update\Update_9b1adeb0.dll", scab3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00
-
Filesize
1.4MB
MD5f834dfc1861cd6361f34496c3bbafe66
SHA1a983e82d009901310c8a3255c4b4e3a02d556fa7
SHA256e99f3517a36a9f7a55335699cfb4d84d08b042d47146119156f7f3bab580b4d7
SHA512088a6170c948ddb2c2b0cf2431ae61688201ef5bc3f1af217a58bf18b26dd9e0ab7ee082f822e736d0467f62e33bf71b806127eb998bed8e739c1e441ac05e00