Analysis
-
max time kernel
179s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:03
Static task
static1
Behavioral task
behavioral1
Sample
0731a7c91450103910bf38ed994d7df4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0731a7c91450103910bf38ed994d7df4.exe
Resource
win10v2004-20231215-en
General
-
Target
0731a7c91450103910bf38ed994d7df4.exe
-
Size
40KB
-
MD5
0731a7c91450103910bf38ed994d7df4
-
SHA1
849de2fabac1defec66dc0d0ec5247f3a96e88d8
-
SHA256
6f7f7779c4573a5b39dc704fc8aa8a105ae6c4dbf9f83ca115ba8d074cb4a76f
-
SHA512
aa734eb512eba2c0854b2e43f5f6eeeea48bf36a96ccda0b06ad6feaf7f12f4be1e577707dbb912f0180fb8001640b2baf20e42caf0481c1fb21dd145f514f2c
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHDq2c:aqk/Zdic/qjh8w19JDHO2c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1908 services.exe -
resource yara_rule behavioral2/files/0x0006000000023207-4.dat upx behavioral2/memory/1908-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1908-54-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 0731a7c91450103910bf38ed994d7df4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 0731a7c91450103910bf38ed994d7df4.exe File opened for modification C:\Windows\java.exe 0731a7c91450103910bf38ed994d7df4.exe File created C:\Windows\java.exe 0731a7c91450103910bf38ed994d7df4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1908 4540 0731a7c91450103910bf38ed994d7df4.exe 89 PID 4540 wrote to memory of 1908 4540 0731a7c91450103910bf38ed994d7df4.exe 89 PID 4540 wrote to memory of 1908 4540 0731a7c91450103910bf38ed994d7df4.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0731a7c91450103910bf38ed994d7df4.exe"C:\Users\Admin\AppData\Local\Temp\0731a7c91450103910bf38ed994d7df4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2