Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:48
Behavioral task
behavioral1
Sample
0222794aea4fb770257b3e9e3f0935b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0222794aea4fb770257b3e9e3f0935b9.exe
Resource
win10v2004-20231215-en
General
-
Target
0222794aea4fb770257b3e9e3f0935b9.exe
-
Size
591KB
-
MD5
0222794aea4fb770257b3e9e3f0935b9
-
SHA1
91670b72550669e6254071834c04e449b1918c6d
-
SHA256
e8727ddc01dab3c6961d9f3dd569e01ae80600f5f3e9abb1a41631978084c36b
-
SHA512
c96e25826880f1595ba4c7edbadbbd4bae77bf22b3b190bf8afc8f185fb0a7de55c41105df64a464924d97270235a686ea77e5fdf2b39ee50808cd78489f41f4
-
SSDEEP
12288:erFbkdvryD1N6oZqiuArohCIOCVNd7zG0WLzCFn7/ewKlGMVHwi0/IH:eJbmrIr6oZ7IVZW0WXw7/ecMqiAE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2292 stop.exe -
resource yara_rule behavioral1/memory/1636-0-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/files/0x000900000001225c-6.dat upx behavioral1/memory/2292-11-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1636-13-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral1/memory/2292-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1636-15-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2292-11-0x0000000000400000-0x00000000004B7000-memory.dmp autoit_exe behavioral1/memory/1636-13-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe behavioral1/memory/2292-14-0x0000000000400000-0x00000000004B7000-memory.dmp autoit_exe behavioral1/memory/1636-15-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\stop.exe 0222794aea4fb770257b3e9e3f0935b9.exe File opened for modification C:\Windows\stop.exe 0222794aea4fb770257b3e9e3f0935b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe 1636 0222794aea4fb770257b3e9e3f0935b9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 stop.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1724 1636 0222794aea4fb770257b3e9e3f0935b9.exe 28 PID 1636 wrote to memory of 1724 1636 0222794aea4fb770257b3e9e3f0935b9.exe 28 PID 1636 wrote to memory of 1724 1636 0222794aea4fb770257b3e9e3f0935b9.exe 28 PID 1636 wrote to memory of 1724 1636 0222794aea4fb770257b3e9e3f0935b9.exe 28 PID 1636 wrote to memory of 2292 1636 0222794aea4fb770257b3e9e3f0935b9.exe 30 PID 1636 wrote to memory of 2292 1636 0222794aea4fb770257b3e9e3f0935b9.exe 30 PID 1636 wrote to memory of 2292 1636 0222794aea4fb770257b3e9e3f0935b9.exe 30 PID 1636 wrote to memory of 2292 1636 0222794aea4fb770257b3e9e3f0935b9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0222794aea4fb770257b3e9e3f0935b9.exe"C:\Users\Admin\AppData\Local\Temp\0222794aea4fb770257b3e9e3f0935b9.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C \\game\command$\setup.bat2⤵PID:1724
-
-
C:\Windows\stop.exeC:\Windows\stop.exe2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5c94f0354f50198afe394788c82f2a72d
SHA1ea491e3b050e467b784ba4b656da179f06fce31f
SHA25644edf11f1d0ab61edd5f9dd95a82416ed6a3074e2d4b0e7a239b1ff3e6c0d6f1
SHA512dfbac6853e67effc670de63abf894d3f842dbe02b09bda7095485a79210513f0948f54e58fa52609e3aafc10c441c302924185c95754fa5fbefa372bf0388f36