Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
138a1335180409c666db663d40b5c132.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
138a1335180409c666db663d40b5c132.exe
Resource
win10v2004-20231222-en
General
-
Target
138a1335180409c666db663d40b5c132.exe
-
Size
40KB
-
MD5
138a1335180409c666db663d40b5c132
-
SHA1
4bd93903e0e2636e7ba087e1d84a078c87187db5
-
SHA256
791bf93cfa3042bb68c2fb39239ec170db06f40af15a1c1adafe6720c3d3b730
-
SHA512
92bcded5e793374efadfc2d1e2ed65aec9b8f6a7b294f2910364c6542c6be1f6d4df46af2febd0073a491a5d0b682c8acd957e06e14b21dac43099fae7566282
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHeh:aqk/Zdic/qjh8w19JDHq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1420 services.exe -
resource yara_rule behavioral2/memory/1420-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0008000000023204-6.dat upx behavioral2/memory/1420-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-63-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-122-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-146-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-161-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-209-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-233-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1420-265-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 138a1335180409c666db663d40b5c132.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 138a1335180409c666db663d40b5c132.exe File opened for modification C:\Windows\java.exe 138a1335180409c666db663d40b5c132.exe File created C:\Windows\java.exe 138a1335180409c666db663d40b5c132.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 1420 3732 138a1335180409c666db663d40b5c132.exe 19 PID 3732 wrote to memory of 1420 3732 138a1335180409c666db663d40b5c132.exe 19 PID 3732 wrote to memory of 1420 3732 138a1335180409c666db663d40b5c132.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\138a1335180409c666db663d40b5c132.exe"C:\Users\Admin\AppData\Local\Temp\138a1335180409c666db663d40b5c132.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311B
MD5cb42662caffe525e9957c942617edf06
SHA1615009db9a1a242579e639ee0fc7a2a765095bfe
SHA256312bf5c9a1a122abc6361bf8ed01a44346285b962c0d273ef2de0eb796ae1b15
SHA5123e6777f1f74f64fff6cb2bd1a81a6c08d9a64feeebc3deb7cacb8f0f41b23a5c59a8e6294b99c76dd386aaaf9043a1a252ac47910fe1801bdc2995f7b675692c
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
312B
MD5e5c2364375c0a8a786a9508a840b6299
SHA1bec1874db0d2348274b6656d1383e262f73e2bc6
SHA25651b67ae1066eb179562cf80a8a156bbd4b139b83072f610bf62c0b6d58ed17f3
SHA512ee19a8fa40bc7e991ac289eb30ceec8264d6071f124e99791022961c99f25b97def4f13fa96149eb52786d1104d85d20410e65a333304c0df6ba858472a557d3
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
315B
MD514b82aec966e8e370a28053db081f4e9
SHA1a0f30ebbdb4c69947d3bd41fa63ec4929dddd649
SHA256202eada95ef503b303a05caf5a666f538236c7e697f5301fd178d994fa6e24cf
SHA512ec04f1d86137dc4d75a47ba47bb2f2c912115372fa000cf986d13a04121aae9974011aa716c7da3893114e0d5d0e2fb680a6c2fd40a1f93f0e0bfd6fd625dfa7
-
Filesize
305B
MD5157431349a057954f4227efc1383ecad
SHA169ccc939e6b36aa1fabb96ad999540a5ab118c48
SHA2568553409a8a3813197c474a95d9ae35630e2a67f8e6f9f33b3f39ef4c78a8bfac
SHA5126405adcfa81b53980f448c489c1d13506d874d839925bffe5826479105cbf5ba194a7bdb93095585441c79c58de42f1dab1138b3d561011dc60f4b66d11e9284
-
Filesize
304B
MD5267ddfdbb8d492b25de208d84b290f1c
SHA19f57d9f19f25549e1232489a0c101a92e851de2f
SHA256ef1f87447ae1ab45548d2934cf0dbd15a32b86359ff9fccfa48d76c1badf6586
SHA5120709aa62d39d419d335183235dcf328e1dfe6997bd9bfbdeb01bb050df8dcab63ec2d4f46e4718ab389fa8e12af66dec2e3019c8871ac6e40927a25cb706c6b3
-
Filesize
312B
MD55431b34b55fc2e8dfe8e2e977e26e6b5
SHA187cf8feeb854e523871271b6f5634576de3e7c40
SHA2563d7c76daab98368a0dd25cd184db039cdd5d1bc9bd6e9bb91b289119047f5432
SHA5126f309dd924ba012486bcf0e3bafe64899007893ea9863b6f4e5428384ad23d9942c74d17c42a5cf9922a0e0fd8d61c287a2288a945a775586125d53376b9325c
-
Filesize
40KB
MD5fbaac0805674b60db0a6ef3d510e08b6
SHA13642c2cd7e879ed8c3dbb81bad790a27bfb2888e
SHA25676ef9397255241b56fa88992c25b30c9c5c193ebcf087848004815f5b852ea9d
SHA5122be43b41ae12419e0a512794b50b8df70832ca6d0784623bbf5a852d60f14fbb0f9df0127a9486ffbcb1c8d1df7b77a1525ae08ecdc3e6d16701cd2f251a4930
-
Filesize
1KB
MD54beb6672b542d0464c421d7f30071595
SHA14c23f77aa73cb5cd27b93c87772262f61ae70e54
SHA2561d9d2bddb18f79d7d11fe7d3fbd55664f04e3afa0873468c4820e57c62d378f9
SHA5128f448efd15013e1f340aeff82c86b79461e99d4c634c8d3dc06d81adba816510c8df1a9f023ad956c3ff4cad76c839ac64a1cea4f30b4d0db28f50f25207da72
-
Filesize
1KB
MD54e327f8d43df724399b6c4888cf24258
SHA1018beaac011f885a0a6f5ad33e09c7ab52e52e62
SHA25688906c8c523faf4c4e0e69bb6371078b15739c898ac0a4832f90235dcc0dc01c
SHA5129f70944eda115f7c70b397db330e298478b28b426f7b884113af06eeaccaa2531e01c9c824f299d9540895596abb0e196c43313e6b9bd10ed63cf7ee3b9c0a7f
-
Filesize
1KB
MD5794038db77b49869c4448b378f653630
SHA17b0e43201be08c76663b0753753a97343db0f672
SHA256b4b5ffa2979e82ad9a08c633804ebc3f96e1e63bff3a5a837656ed69bec4463b
SHA512a5f126cc17875f06516e10224a660f9698a1ac53b7380ff30f16ccf6f828752f065c1742c1bdde40dd01eaec9d9bb42e144bcfe5a24b4ff01916f860d0c4d7e5
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2