Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 17:56
Static task
static1
Behavioral task
behavioral1
Sample
09e4b4b943b6bb80d59b83fb8f6b9470.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09e4b4b943b6bb80d59b83fb8f6b9470.exe
Resource
win10v2004-20231215-en
General
-
Target
09e4b4b943b6bb80d59b83fb8f6b9470.exe
-
Size
209KB
-
MD5
09e4b4b943b6bb80d59b83fb8f6b9470
-
SHA1
a57e6d9adcaf9076b060d2b033ecef428fe2f6a1
-
SHA256
25559a3f73bf2d86a333fb1f7d6c7b794576c276f5823d2a5f771a94259490d4
-
SHA512
10c9663771b6f1368e8172a0ea2edbc2b6dd9edcf2fe068a1f0ddaa1d8cc99fe79fef0482485ea010fba1b39002ba23686a52b80243d126a97c8ee6c205661bf
-
SSDEEP
3072:AligYAyRYjGkHgzC9fOlnCLRH6kP9ni5KRh2OPMcb6rky8+ZsiCF8dvNce:Ali5zglHgz62lCLRHG5I2OBmrJ8StP
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2296 u.dll 2928 mpress.exe 2100 u.dll -
Loads dropped DLL 6 IoCs
pid Process 1308 cmd.exe 1308 cmd.exe 2296 u.dll 2296 u.dll 1308 cmd.exe 1308 cmd.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1308 2636 09e4b4b943b6bb80d59b83fb8f6b9470.exe 18 PID 2636 wrote to memory of 1308 2636 09e4b4b943b6bb80d59b83fb8f6b9470.exe 18 PID 2636 wrote to memory of 1308 2636 09e4b4b943b6bb80d59b83fb8f6b9470.exe 18 PID 2636 wrote to memory of 1308 2636 09e4b4b943b6bb80d59b83fb8f6b9470.exe 18 PID 1308 wrote to memory of 2296 1308 cmd.exe 19 PID 1308 wrote to memory of 2296 1308 cmd.exe 19 PID 1308 wrote to memory of 2296 1308 cmd.exe 19 PID 1308 wrote to memory of 2296 1308 cmd.exe 19 PID 2296 wrote to memory of 2928 2296 u.dll 21 PID 2296 wrote to memory of 2928 2296 u.dll 21 PID 2296 wrote to memory of 2928 2296 u.dll 21 PID 2296 wrote to memory of 2928 2296 u.dll 21 PID 1308 wrote to memory of 2100 1308 cmd.exe 20 PID 1308 wrote to memory of 2100 1308 cmd.exe 20 PID 1308 wrote to memory of 2100 1308 cmd.exe 20 PID 1308 wrote to memory of 2100 1308 cmd.exe 20 PID 1308 wrote to memory of 2936 1308 cmd.exe 33 PID 1308 wrote to memory of 2936 1308 cmd.exe 33 PID 1308 wrote to memory of 2936 1308 cmd.exe 33 PID 1308 wrote to memory of 2936 1308 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\09e4b4b943b6bb80d59b83fb8f6b9470.exe"C:\Users\Admin\AppData\Local\Temp\09e4b4b943b6bb80d59b83fb8f6b9470.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4AE5.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 09e4b4b943b6bb80d59b83fb8f6b9470.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\4B72.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\4B72.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4B73.tmp"4⤵
- Executes dropped EXE
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2100
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2936
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f0bb502733d88b8d657a9522df60d24d
SHA10f9f73591aafa28300169df0dff51afda2f810fc
SHA256ef6f9ac7c1d737f3e15fb76f77c624156eb6e0e53414fec00a897cef38180d9a
SHA51298ceaf127856a0d44279204b38e613f84fb3d6f24b9d0e7981f9543b703dcee1655023629bde1ac436be5de6a939ddcdc4c7a3084786692e7e4e82d6cabc4f6c
-
Filesize
1KB
MD5118ea5a89a8339f2b622717d48f9285b
SHA1af38929dcc57a7148af3372008a294a80f3635b4
SHA2565cb9cef7fa6145284b1593f53f788c5897c8e046fc90943ece566812ef453c62
SHA512a97715b5b53f060ac8d00b170de05198d03871b95b1a8a0afd7b552e1814d271d74d2d52b22d20542e69c4aac2232a03ae8597958902bd05047031bb1009cf1e
-
Filesize
28KB
MD58ad9607c7de707342b921eb040efc5b0
SHA189a0e9f6593b8d6ed43670653ea4585d2b673fbb
SHA2569c7f5250c87bad0fbdc856661002b1946e3757054105426caf085a09d486828b
SHA5120372680c583264bfbb973d5254726f645e1b3d39c2b92b3c390b010c61d3d63fb1b2ccfcd40cfda202f1afe51f9911c1e6e0067bbd490bd15ef338b3a7857513
-
Filesize
1KB
MD5889fa0ac82f2ce37dc33898e7f3deb0f
SHA10e1be5b3f293476875be62bde27c2092f732a48d
SHA2564837308b8b91ac94a3dc0fd3d28c0f3c01d715ed47a493a15ebd2da6ffa3cc3e
SHA512b1ab2bf48be957aef082596c47f4f89153c4190a58f0f91e6e8894e9961bf1c31691e466a4f6e567a4d4402c6f3b46e9d84564a31104eaf8e011167a78e71130
-
Filesize
5KB
MD5e0441d11dada6d1628168933e86e276c
SHA186a6a9a2dac09fe0694810d5d40a152db4290cbc
SHA256ae4b96f929d1704067de46b9c579682d2581d6624cfb33afb5c06419ee9de004
SHA512005267cbaa1ce9b2489d87c403ef39385c48727d5d7f2c5e5fb8658dde36a328460d9481edff7b52cb04f9343b58082a245b9066942a5dd878b658ef35d307ae
-
Filesize
24KB
MD5226830d6347aab2ea58f4e58bee748ca
SHA1f5219318e736237941877549319524f9f0f4dc97
SHA2566107be941b96931f172edb47742526c04dbe32156e71045650a4c9fe7369c326
SHA5121603938d9f5c030625dc9778e06d1fdf98d0818818ea3240efe1a3122e7c9743e7b6403949df02716531cb8ddb5a1358fb7ece9594f32c08f4e0f466b1832824
-
Filesize
41KB
MD5f6e37b5b08d4514d8347cb5ed4e670f2
SHA10c42b901ed5f2e9e76822ccdab3299b714a89cf0
SHA25641ac25ee169e9baeccb3d8ccaa3be68b912286125520e56d0ed9854608966a02
SHA51203cb6ed9236b0e5b679ba92f4e5ca07a1874717af3dcb7f24237c7431bdacfebcfecd46df500083f40f626f5ddef4b18c12feb5338924522dfd9f32751b6f301
-
Filesize
168KB
MD50e5d655f50c87a747c6748ef14b1db08
SHA19b54d58d4773990b4ec64e895191012502754651
SHA256118edc1ca3761cee30edc7d5a98820f557c513047a6d36818273ac2d3044bd11
SHA512b2d19f7fdccad896676e2f3190412c89dd7801ce7502271733d563984f5189b8b836cd3cf7139daa89bf9bbed2ee3bec1f66f1849d12a3cfdbfa55f89b023236
-
Filesize
19KB
MD58d3cafb1c49a57f6fff62531d478821b
SHA1866b4b506604ac8887cc0ce5fc062cefaa8a68e6
SHA256d6d4ec577b0600491d8519296db1d79058ec566177920393485c827e923073e4
SHA5121690633a406c8b0afc42b2902b611effbc4eb5a20880758aa47249de60115aadbda2681e5dff1f11901cd6209edfd87c5cf23ddecfc47d85dc1a66c1e9bc211e
-
Filesize
57KB
MD5525b08812a0b4a17ae8b3594c227a4c7
SHA13b6f9ca9a1d98ea4b25301447e465b1eedb903ca
SHA256fd2e5e784f65e21abc1051dca4be4c5c10ec3c48a7c6277b88ed311eb3735a4f
SHA512d1cd2af1fab25bbddc05079cec3722d9efc3e327075531ab9ac6a793441962b848034baea04dc5c6816cbac5a80d05ce1034f69ab6e2f79b0aafcb282f307e3a
-
Filesize
131KB
MD5d1511ea8f72dfae0602eb33930f04a4c
SHA12fa699a3453c6b371a12dea5dbb5bb7f7bcf3178
SHA25612050b8d3f69bdcadd01a26a842aaf52dc6ce316f07b213c46d53f5f3f96d659
SHA512fe9976349381ce9a4be31b68f8f8a4910285fcd84220b575eb0226e8b5a216f93b6c2fab531df367107a883c48ea96a43114a70b606dd7f96ed613fb8e7c1160
-
Filesize
1KB
MD58115a59ab7c900ddf7b3784d27d6819d
SHA1075dfde636f77b0d28327deb9cbe9dd45c399641
SHA2568d114250d3860a8f85861e8febac6756b70d8c18d91816d170ba38b6f390de3e
SHA51229036ce03380bdfe5519040544fb43a718f1fd2dc7530a9d808976d5da8f09ca06645c0bd5056cd6120e572e7b3e31c24bd03d98219135261e777c4c3859d4d6
-
Filesize
2KB
MD531d40eb5c2fc499f5a3eeaa50d7f00a7
SHA1e0a68f908fa95cea346a5304a3a64e633520f095
SHA256384f3b8069c836bd0c2dc4fa512ddd4aa3c223e112dc635fec42af965b369ff9
SHA5122132a9cbdbd747ba6a5efa9d8a0c7760abbca4bc7f162c0635592ddf4e04a0d32c4995f77eca4fb78ec83360f63acfa6d417abb3f4f1e352e928238caa9710b4
-
Filesize
92KB
MD5c880f937f3dee3a3fa35d7d3640b54ac
SHA13345ed7e212eafee3c48d94b4ed5bd78c62de919
SHA2563bec6888eb372e15c606fa1d3382d6f8c468d7237175a7f7bb667f9693bb9747
SHA5128973de6a675e3768d20e8a95f9035ab448b2acd7823c14e2028afb570026859fcd14be4e39c377fb6048943db6545ef56e947d9f4956034fc85a29198a45a28d
-
Filesize
21KB
MD5653908003d5236e355daf65649747345
SHA1d923d9ee12ae16d3a2fa8231e8f7a0cb9d49a736
SHA2563a7a6e86bf802832e424c816031dc297358b66f549d61cdc9e7162cf2d1357df
SHA512f9eb978e0023b2e945285cd9ea159c8486041d5c542947bfcc6aaa930d28a9d4c5e7b01dc0a17e43d4b8ce43c209c15fd9dc434006ca2f09abf7a114464fc942
-
Filesize
39KB
MD5e16c40f7af58d3de4a382b65cd816453
SHA10c416e247b371d71b7dc9e51129240905fc05902
SHA256698771a45e563e227e1e13facb3a444a9453fcebf3c6a83e0e66b55f8efe09cf
SHA512254ebc4e9c466d53481cce8897615aea62fd6fb8b9842546f2b776689c9f72b08860e25c3790f32f431f98d7445918065562e2b3c7ff8ed8f379c7ecf561f9c6
-
Filesize
64KB
MD5d3f5de48e29a3966e2a6916654b511c6
SHA15c5c1d4c4672779c7b7f55c90f808e566c0f9a54
SHA256200729364bbcb98929a724d5bb98df9bff2189aea37c761f4cc2356a55da4923
SHA5126b955e8c3db58b998217d7b895888a9f2461bdc67b9bbc7fc7083ea0d1be810ca43ee4859c07093076b8065e5515fce8028d76b15a12222d23fb58760acc538e
-
Filesize
123KB
MD53517617e6d5a9470be633dc519d96bc3
SHA1bda7fca2c3727f2b8e9b42f4655b9937ef103e9d
SHA2562600cf95469b1c78491a82cf8479b3a8c5577a574fd362e489a763b359cbcafb
SHA5129519494a66be487f3c10a03b4910493d007bb8067cb8fd76a07dc851e63c7c47e9c8a10e282f5b963c367dd8fd3d9b3e2d900c1fa3dd0055db76d8b4abf593a0
-
Filesize
46KB
MD530393f8f1261c05241f686e653a86404
SHA1f35f2f9e546724b1473605ce042660dd605250cf
SHA2561a3e2a0a00b7551ce12b77adce75e2d34ec01254a4fff6de40fecf1c0bfe9336
SHA5128cdcde4578b1b3a53d02e05a9675dc21fc00f78db426cf8cc6b4770da9517191223b819dfb627721a8f9ed6f1e52cbcd4d79d6a815cb577e83a6e94e3ff3c827