Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
075f24a2f612b3f01df2824243f27ba5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
075f24a2f612b3f01df2824243f27ba5.exe
Resource
win10v2004-20231215-en
General
-
Target
075f24a2f612b3f01df2824243f27ba5.exe
-
Size
40KB
-
MD5
075f24a2f612b3f01df2824243f27ba5
-
SHA1
eb82f322020ea958caa64d64f2a381fba0b14372
-
SHA256
e00c20d577a96c8ab660d6c8ea5ead6a598d2bfa0ba03ef11252cb4c7314e45b
-
SHA512
6a74f092b284a98cb094053ecb815fdc1e7f254a41a31119d3b3c7a19b3ac4d157824ba1f42c6716067a464ab056bfec9c7e19cfa711784cba1387bd5363ff7b
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHkpt:aqk/Zdic/qjh8w19JDHk7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3140 services.exe -
resource yara_rule behavioral2/files/0x0010000000023153-7.dat upx behavioral2/memory/3140-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-39-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-104-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-154-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-165-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-166-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3140-170-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 075f24a2f612b3f01df2824243f27ba5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 075f24a2f612b3f01df2824243f27ba5.exe File opened for modification C:\Windows\java.exe 075f24a2f612b3f01df2824243f27ba5.exe File created C:\Windows\java.exe 075f24a2f612b3f01df2824243f27ba5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4008 wrote to memory of 3140 4008 075f24a2f612b3f01df2824243f27ba5.exe 16 PID 4008 wrote to memory of 3140 4008 075f24a2f612b3f01df2824243f27ba5.exe 16 PID 4008 wrote to memory of 3140 4008 075f24a2f612b3f01df2824243f27ba5.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\075f24a2f612b3f01df2824243f27ba5.exe"C:\Users\Admin\AppData\Local\Temp\075f24a2f612b3f01df2824243f27ba5.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD5267ddfdbb8d492b25de208d84b290f1c
SHA19f57d9f19f25549e1232489a0c101a92e851de2f
SHA256ef1f87447ae1ab45548d2934cf0dbd15a32b86359ff9fccfa48d76c1badf6586
SHA5120709aa62d39d419d335183235dcf328e1dfe6997bd9bfbdeb01bb050df8dcab63ec2d4f46e4718ab389fa8e12af66dec2e3019c8871ac6e40927a25cb706c6b3
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
31KB
MD58aaebff4e6e91e5564273c732b4c0cd5
SHA157f6e6ffb345e7abdafa6b11c051c57af25b182e
SHA256cce8ab243ada273f00ee5a01662881abb6cff9ea0440287e19c530ce5a898472
SHA512b6fbd6e594a855ccbe43e6f442caaeeda4800fd3f665ee3e3d7dfc1d445ea9b9169fe99aa1987606f796b2efbd9a2431313b23579714ccd814654e6b89dffca8
-
Filesize
1KB
MD519693779310b542b16d1f8b0700b2a19
SHA1c3c36717aa7745f737198a69d23f1956b5e8c6f2
SHA256f9f8799d26f6dd6d130c3dc289bd9e336516cfc039f059dba48dfbc471f54f59
SHA5125a7a4c6c5b20362e1a2811c2d7051e76db05b60b51da184ffa7ce65129b2c38a1bb703f1f815afe4144bfef07b88605e4290662288eb5cbd471c3b958f2eef6c
-
Filesize
1KB
MD53117f80eacd093226caf2f832fc870d9
SHA138a78f85199304f469830ca3064667a5ada57ca8
SHA256b72426be771a2926dddd512a551294a5f35fb507a56ce3ae3a143772bd6ef1ab
SHA512c4047b2ef506812615703c1950d28f03b9cc10d19934ca6f41c8253ecaa6c40b442a911c7053fd25165c31f342c68af157a14283ce9752dacd54a2226a343277
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2