Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 17:17
Behavioral task
behavioral1
Sample
06f7a27e9e7b39efc723ab7c10e0358d.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
06f7a27e9e7b39efc723ab7c10e0358d.exe
Resource
win10v2004-20231025-en
General
-
Target
06f7a27e9e7b39efc723ab7c10e0358d.exe
-
Size
29KB
-
MD5
06f7a27e9e7b39efc723ab7c10e0358d
-
SHA1
76ac17ee68a512db1ecd84a4c2fd9ba4da100503
-
SHA256
8212362882d88e6b4d10ae27a5933d892cc12925002ec72390a2c9e1f4b3a95b
-
SHA512
d10cdaa4cd18857c6182411aecacf902286661c2c0d9eaaa13a5af1a7ef37803a0d98352b913039337e3cfd81bf233c5f50f0d68217593a0d64181d5e1743c71
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/9:AEwVs+0jNDY1qi/ql
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3404 services.exe -
resource yara_rule behavioral2/memory/4916-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x0008000000022ddd-7.dat upx behavioral2/memory/3404-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0008000000022ddd-4.dat upx behavioral2/memory/4916-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-24-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-43-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3404-48-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0004000000000737-58.dat upx behavioral2/memory/4916-83-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-85-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4916-130-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-132-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4916-185-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-186-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4916-245-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-246-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/4916-290-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/3404-291-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 06f7a27e9e7b39efc723ab7c10e0358d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 06f7a27e9e7b39efc723ab7c10e0358d.exe File opened for modification C:\Windows\java.exe 06f7a27e9e7b39efc723ab7c10e0358d.exe File created C:\Windows\java.exe 06f7a27e9e7b39efc723ab7c10e0358d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4916 wrote to memory of 3404 4916 06f7a27e9e7b39efc723ab7c10e0358d.exe 84 PID 4916 wrote to memory of 3404 4916 06f7a27e9e7b39efc723ab7c10e0358d.exe 84 PID 4916 wrote to memory of 3404 4916 06f7a27e9e7b39efc723ab7c10e0358d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\06f7a27e9e7b39efc723ab7c10e0358d.exe"C:\Users\Admin\AppData\Local\Temp\06f7a27e9e7b39efc723ab7c10e0358d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
304B
MD54d1a10f22e8332513741877c47ac8970
SHA1f68ecc13b7a71e948c6d137be985138586deb726
SHA256a0dbc1b7d129cfa07a5d324fb03e41717fbdd17be3903e7e3fd7f21878dfbba4
SHA5124f1e447c41f5b694bf2bff7f21a73f2bce00dfc844d3c7722ade44249d5ac4b50cf0319630b7f3fdb890bbd76528b6d0ed6b5ad98867d09cd90dcfbfd8b96860
-
Filesize
304B
MD5605de1f61d0446f81e63c25750e99301
SHA10eaf9121f9dc1338807a511f92ea0b30dc2982a5
SHA256049f75dee036da00f8c8366d29ee14268239df75b8be53aa104aec22b84560f0
SHA512a6a2505b8b89a895922ad6dc06d2ce620cb51cc6582c1b7e498a9f1ee1e4e47c53ebc4f92f8aa37532d558667225e30574732c9fe7187153a262c933893e4285
-
Filesize
308B
MD55243568476eb2052b2f3b67dc9053e86
SHA1b126aa6506772f9024b76580bdf28b45e3a7f051
SHA2562d458622dc76eb87e44cc7db89309efdf50f99821145ae86864fd1b714cbaa80
SHA5123c68cef4e3daa4bca6e8b3aa5a31874be1e4dec38fe9781c6fe4890980744527d0c6818eeb519f8e6b322118e1f08302d85972fa7da4ba8be9421aabf9a77833
-
Filesize
302B
MD551b86971925c7d24d895ff89fdebc8f5
SHA1d037148e50a77f0de8421e0ef81f87f9f73570da
SHA2563b50a39db6499f5cb2d3b6cec01daa5c33fcf80c0722707c6014e23ed1577280
SHA5121bc88174ee963971ca43e106828d9e74473cf1aa664f6d4fa43ec9631610ab4c1dc9a0c84f5c89dd2b627eaf64f57dee99eca84b88eb14c36bf7285cb9d7f0c4
-
Filesize
29KB
MD52e39afeb66b50f2be04f1f40df65fa05
SHA174ef9dd47d3ab910a1e5e866d1b3a2c0f78106e9
SHA256789cc7ddf1bd8fac641a7ba1a536673c15c5f5c9e135596f1b5b84cacd09aaec
SHA512ebcd66a5880447801436ecd31feff5e4a66fbf05dfe1cd865d52ccc82336a075c069c43b51783b9d806542b965d34dac187918e3e5ee12d3b93e08b23b01e77c
-
Filesize
320B
MD50661bd8109e744de7ab12cf61bea1108
SHA13977638c2846cce13e9f37c25bdfba6a65223c0d
SHA256f8c965d47d6db6231687586438cce4069a73f227f0c2ebb948d577a80fa60cf7
SHA512d406011fe65dffba33aad56e18a053ef4e4ddb2cf24bb9858b79454859f070f0f14b266c143d77b66c0d3f14ddcafed7d730698358dc439f4571d2c26d9077ed
-
Filesize
320B
MD531301fc28beec4e8c7c19ad3c0ece38a
SHA171adf67852c9a06d8cc175da9ec8f64d529340d9
SHA25698457c8db0228146d8fd5f5cd1cd775bb62faae6813c90255b9601d38abbefdd
SHA512149871af83f49c64bbf0e20553bdf1eea4e45b3c4174f0ef942292939697ce153f3ede6976cdc4812ef25536632b914858ebfd5944449ce1dd128f8237a1d8c3
-
Filesize
320B
MD5f3e9a495572e66e0526b2ff0a9c40af0
SHA1192991f71e058420d28f9483f28e164038dc11e8
SHA256ec5efef87e889f733bddb07257bf12750a68b730e42f58eb76d3c41e18a9ed57
SHA512be55a86eb79f2e8300f775dac44bbb8c117fe43a126ab597ae13a1b5822b44c90f9b47d9cf100e71338385d65ef096f232d0bad2c481e1d2926dceb4b3599f33
-
Filesize
288B
MD544ea936129595d0e7eb16d78a390e9fb
SHA1f1ed0ba953b555b4a8f83eebcb721ba71e01a7fb
SHA256f854769593e914d5771cb7c8929b4488d4016b964cfb7bc99112b5a2b91336d5
SHA5128dc6545c7d0402054dc4429ffde836b53c2280444a4714368a4d9a154e395ce74d52a621e2ff5f6fed5ab3cf66fc58d790404808c798c401f5d31bae3fed8bdf
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2