Analysis

  • max time kernel
    1s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 18:22

General

  • Target

    0b7c0afb76cc1303a8f1038603c720f2.exe

  • Size

    208KB

  • MD5

    0b7c0afb76cc1303a8f1038603c720f2

  • SHA1

    9410966e8f2605a3da0ff4fc1918b710d593ea13

  • SHA256

    5fc5f09e956b2bd837f82d7ac00c05373111f6f9f4c443da32f3a102f49099f2

  • SHA512

    817ffa7de21221fe05f683b5ecb5dff6b52aceb74ddba616e49a81d4d7a7e32c5633689113367aaa556d59320ec52a347f1e60a05492def21b46206621ddf054

  • SSDEEP

    6144:RlNgwyZYsR2ctyfw3l/9iG48C5BOVBZwKT:RhYYsR2ctyohU8C5wBZwKT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b7c0afb76cc1303a8f1038603c720f2.exe
    "C:\Users\Admin\AppData\Local\Temp\0b7c0afb76cc1303a8f1038603c720f2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\53AE.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2052
  • C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe
    "C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe540C.tmp"
    1⤵
    • Executes dropped EXE
    PID:4768
  • C:\Windows\SysWOW64\calc.exe
    CALC.EXE
    1⤵
      PID:4984
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
        PID:1184
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save 0b7c0afb76cc1303a8f1038603c720f2.exe.com -include s.dll -overwrite -nodelete
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4380

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe

        Filesize

        37KB

        MD5

        f97f0592253534ea0b15a4302a3cdffb

        SHA1

        6d9efc28f7ce2b9c53061a2ef8e2df58d0300369

        SHA256

        662c90baa9cbd07af0decc8f260483f15e0e29b1629f44d1832dd9fb53e87fd1

        SHA512

        6580a60bdcdfb5bd647b9e1371025e6af6891dc544a51d19133fec64452c114c82b19047e402cf4c333781d047765765b850dee828b9496e1054335254e9f308

      • C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe

        Filesize

        12KB

        MD5

        ecdce9a6e4bec9623f01d627fdefc1c2

        SHA1

        f715fbefa2981f228535e802dcaeed3f61a07a1d

        SHA256

        c8e01f9e1e126f50bc7f86d5f4f0d885869e3744b8f736f98d5b51e96337bbeb

        SHA512

        a23db54d27e52fd420614e50308d2c25904963f43799c65877cab57a73bf2f3902c3f134697c7586cf2ed2aea44ffee172f2861b8d52b16dd70b4732521c0401

      • C:\Users\Admin\AppData\Local\Temp\exe540C.tmp

        Filesize

        41KB

        MD5

        f7d46418a33764dd76d7a4884d35a192

        SHA1

        df2ac112309d82ea5e0e8c5919bb664ebedaf5c8

        SHA256

        ff34e2440937e60d6e3ce805827a77750f407c848cad773df28a889dbefd779a

        SHA512

        5c6fbdaa916df4d3d169d9827d64020a2d6f5195e479c3bcda52051058e37e4033eb0b1eac5ff57ac33b7b0d2046625c39fbfa494baaf7f5ece783d0c55c291d

      • C:\Users\Admin\AppData\Local\Temp\exe540C.tmp

        Filesize

        24KB

        MD5

        159a8487c515a71e48ceacc9e098effa

        SHA1

        bcea437733428a69c7104aeddb7a8759b2da4256

        SHA256

        1a5d3c5c8395a11d01c6edfb4fc5389627290c26f7ee3f6e2c66a17cb348feef

        SHA512

        f94abc5c5d14877883a2dc9191bbec01a5878f4259081ba802ec201dba3e38843d6c08cf97d8587d34c2e92309e493daff1cbf3271d58dc79ba7414a37145b69

      • C:\Users\Admin\AppData\Local\Temp\s.dll

        Filesize

        117KB

        MD5

        56eaf437dbb5838b6d1ceafe94bd0a44

        SHA1

        1148cf190f38351fe89eef07d0cfad7c20f258e1

        SHA256

        e8c3a2548e52089865ab6f2d82e0b6c4d180632163f6823069009eb60badfd0f

        SHA512

        6aa77519ffb5e2a4135a87d1f6dfebb00078f36eec39e0f4c52efea64037a62bec2782b9ea0957bb9990402e721cea72e7243e04f3fd15b11c73a01e493561ff

      • C:\Users\Admin\AppData\Local\Temp\u.dll

        Filesize

        14KB

        MD5

        5cdd5a7d19db669c5dac19fd6f428093

        SHA1

        7efaa63bf51aa7df4b6f6caf08475f7f0aadc3e4

        SHA256

        a71da558e28f590becb0a6de6ef2281e993669b2d3a230a2efe558a7d717c741

        SHA512

        5022f162f8bce1fcd8bb0f563c641641c4a169278bf1f0524ad1db13a30e63992829207740bb9ad7747fe694fed73485a85825152eb91c14afe5b3925c16e3a3

      • C:\Users\Admin\AppData\Local\Temp\u.dll

        Filesize

        11KB

        MD5

        8b32a752a174face0b6ae417890a29c2

        SHA1

        3df0d30d9b481bbf816b4915e47c29ba05164cf1

        SHA256

        fc6288f7ac7e7341147e05d3694713c2c07c252f412bb60aa5101548abbcb51f

        SHA512

        f16191195de4ca2b2b3070c62f90c012c12b5125227f76f8c7f3805c759a267f2c78655ba16bd04fa3a65356320be8e4873c7693108e59b8b22bdfb2104b3729

      • C:\Users\Admin\AppData\Local\Temp\u.dll

        Filesize

        70KB

        MD5

        4ce582f72671514a0a1c1c3fa2a6993f

        SHA1

        d1c62749156b2a0449941dfbaa2442dda2946701

        SHA256

        ecaca21fae55ac80faa37ff7ead9bcbad858a0c9af6cffc185360ee6ddd8e1e5

        SHA512

        bbe16f68a47b900489b7511c5e33505aa37a1e7e889cc303c3eefc045ab2ac26c6c0042053e38ab5833c9be523f79621f8975e69eb8bc8b6d9babcc43b073a43

      • memory/864-0-0x0000000000400000-0x00000000004BF000-memory.dmp

        Filesize

        764KB

      • memory/864-1-0x0000000000400000-0x00000000004BF000-memory.dmp

        Filesize

        764KB

      • memory/864-70-0x0000000000400000-0x00000000004BF000-memory.dmp

        Filesize

        764KB

      • memory/4768-56-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB

      • memory/4768-62-0x0000000000400000-0x0000000000434000-memory.dmp

        Filesize

        208KB