Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
1510c10ebaca5e209de67b21e33e43f8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1510c10ebaca5e209de67b21e33e43f8.exe
Resource
win10v2004-20231215-en
General
-
Target
1510c10ebaca5e209de67b21e33e43f8.exe
-
Size
40KB
-
MD5
1510c10ebaca5e209de67b21e33e43f8
-
SHA1
05eb0fc45183ddbef946b172f7007553b0abeadd
-
SHA256
3a79ead3c6b74b3db352ddf95e5c1bedf377840eff6bf5fa0be41173783105ea
-
SHA512
cb1a9d950ea027b0c3f4b15581c201bcdef122d0a8b874f6fadcdd32e7756c539dde0cd010a3f1777a9d55303707252ed636c69ea39281071786c1627ecdf83c
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHxkq:aqk/Zdic/qjh8w19JDHxJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1392 services.exe -
resource yara_rule behavioral2/files/0x0006000000023229-4.dat upx behavioral2/memory/1392-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-79-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-94-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-174-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-242-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-257-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-265-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1392-292-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 1510c10ebaca5e209de67b21e33e43f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 1510c10ebaca5e209de67b21e33e43f8.exe File opened for modification C:\Windows\java.exe 1510c10ebaca5e209de67b21e33e43f8.exe File created C:\Windows\java.exe 1510c10ebaca5e209de67b21e33e43f8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1392 1292 1510c10ebaca5e209de67b21e33e43f8.exe 88 PID 1292 wrote to memory of 1392 1292 1510c10ebaca5e209de67b21e33e43f8.exe 88 PID 1292 wrote to memory of 1392 1292 1510c10ebaca5e209de67b21e33e43f8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1510c10ebaca5e209de67b21e33e43f8.exe"C:\Users\Admin\AppData\Local\Temp\1510c10ebaca5e209de67b21e33e43f8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
304B
MD5cde2c6ec81201bdd39579745c69d502f
SHA1e025748a7d4361b2803140ed0f0abda1797f5388
SHA256a81000fc443c3c99e0e653cca135e16747e63bccebd5052ed64d7ae6f63f227f
SHA512de5ca6169b2bb42a452ebd2f92c23bad3a98c01845a875336d6affe7f0192c2782b1f66f149019c0b880410c836fc45b2e9157dcccc7ad0d9e5953521a2151d4
-
Filesize
310B
MD52a8026547dafd0504845f41881ed3ab4
SHA1bedb776ce5eb9d61e602562a926d0fe182d499db
SHA256231fe7c979332b82ceccc3b3c0c2446bc2c3cab5c46fb7687c4bb579a8bba7ce
SHA5121f6fa43fc0cf5cbdb22649a156f36914b2479a93d220bf0e23a32c086da46dd37e8f3a789e7a405abef0782e7b3151087d253c63c6cefcad10fd47c699fbcf97
-
Filesize
311B
MD5cb42662caffe525e9957c942617edf06
SHA1615009db9a1a242579e639ee0fc7a2a765095bfe
SHA256312bf5c9a1a122abc6361bf8ed01a44346285b962c0d273ef2de0eb796ae1b15
SHA5123e6777f1f74f64fff6cb2bd1a81a6c08d9a64feeebc3deb7cacb8f0f41b23a5c59a8e6294b99c76dd386aaaf9043a1a252ac47910fe1801bdc2995f7b675692c
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
40KB
MD574249cb2d7e8b31143e178b0e3d110ed
SHA182ebaf27c8d0914aa5f3450e28e361786b7a95a1
SHA256aac7adb363bd87196f8f8990e503a454cc36adbcd45774e5750de4046a462336
SHA5123d4f45c0bb6b9b2e0a23f7b7eaa992cc292c754897dd656e5a39df67a9de1176820d4d85d7add0be02a0aaf68d6c11093bfa5f2c4deca42744de7c3aac8988de
-
Filesize
1KB
MD55246156480c5a01f319bcd231321fbe8
SHA1affd5d16b59f2efb84ea40488092575b4e9a4e1c
SHA2566e6b40ac5318fbcfe80cf41597431ab1e5c4cde2cb2664021d022eeb469df78c
SHA512d5d70bfb9afb9de73e19d2a6b085ae3a5913ce2a9f0a120c5aac578e0e3a4183619e2bec69af07a54909389d294d98faa4dc5f0ac587b3b800e2cc1f30c41003
-
Filesize
1KB
MD5b50823ccb592afa76f15ebfb0aa05d7f
SHA1f0aec056059e467ed73a18b6ab16ca77c13ab986
SHA2568dd7766725f5529c36bbd976c8c6dc2d82c2cb01201374ec4d787b7cfb3c6453
SHA51231f9aa7939ff5bb66384a4439d5bebe7fb71007be7dfc89fccf90c6ca385461058fc4d6f45f3602d2116f204dff7e630e17bf6085d45588abd5aab0d614c770a
-
Filesize
1KB
MD5db7980feea93c1650b0be3881d95db72
SHA13fb5de57db8c2b014b6861c37c692ca546cd9908
SHA2564cc15b9cf3fde4600debd4084a4356ecf9e3fc38746ac40149a0183c3a21b247
SHA5124fcf56e3c56855c7daf7cf7f39238ef0a261934de6246c1c51159c893ca1111be26684eca461d2019efe2bff6c41e8a82caf23a39491afd45df641dc09fc9c3f
-
Filesize
1KB
MD50aea057c1f6ec7c9f9432609b70f1bcd
SHA1336ebc1459cd0c60bd3ce795ef41480b26c4222f
SHA2560d3568aec47e0a3b8c4f6278d6e5d34a0e9bc18f9df8d18e9f76799d5dc4762c
SHA512918b8ceafc506b4236cba23b6010234983992dce1c7078079323b8baf09702c1758fccd0e716ce8559ea75ce67f0db305874689f8221be834d132fd479f763cc
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2