Analysis
-
max time kernel
1s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:22
Static task
static1
Behavioral task
behavioral1
Sample
0b7c0afb76cc1303a8f1038603c720f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b7c0afb76cc1303a8f1038603c720f2.exe
Resource
win10v2004-20231215-en
General
-
Target
0b7c0afb76cc1303a8f1038603c720f2.exe
-
Size
208KB
-
MD5
0b7c0afb76cc1303a8f1038603c720f2
-
SHA1
9410966e8f2605a3da0ff4fc1918b710d593ea13
-
SHA256
5fc5f09e956b2bd837f82d7ac00c05373111f6f9f4c443da32f3a102f49099f2
-
SHA512
817ffa7de21221fe05f683b5ecb5dff6b52aceb74ddba616e49a81d4d7a7e32c5633689113367aaa556d59320ec52a347f1e60a05492def21b46206621ddf054
-
SSDEEP
6144:RlNgwyZYsR2ctyfw3l/9iG48C5BOVBZwKT:RhYYsR2ctyohU8C5wBZwKT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4380 u.dll 4768 mpress.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 864 wrote to memory of 2052 864 0b7c0afb76cc1303a8f1038603c720f2.exe 24 PID 864 wrote to memory of 2052 864 0b7c0afb76cc1303a8f1038603c720f2.exe 24 PID 864 wrote to memory of 2052 864 0b7c0afb76cc1303a8f1038603c720f2.exe 24 PID 2052 wrote to memory of 4380 2052 cmd.exe 23 PID 2052 wrote to memory of 4380 2052 cmd.exe 23 PID 2052 wrote to memory of 4380 2052 cmd.exe 23 PID 4380 wrote to memory of 4768 4380 u.dll 19 PID 4380 wrote to memory of 4768 4380 u.dll 19 PID 4380 wrote to memory of 4768 4380 u.dll 19 PID 2052 wrote to memory of 4984 2052 cmd.exe 20 PID 2052 wrote to memory of 4984 2052 cmd.exe 20 PID 2052 wrote to memory of 4984 2052 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b7c0afb76cc1303a8f1038603c720f2.exe"C:\Users\Admin\AppData\Local\Temp\0b7c0afb76cc1303a8f1038603c720f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\53AE.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\540B.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe540C.tmp"1⤵
- Executes dropped EXE
PID:4768
-
C:\Windows\SysWOW64\calc.exeCALC.EXE1⤵PID:4984
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 0b7c0afb76cc1303a8f1038603c720f2.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5f97f0592253534ea0b15a4302a3cdffb
SHA16d9efc28f7ce2b9c53061a2ef8e2df58d0300369
SHA256662c90baa9cbd07af0decc8f260483f15e0e29b1629f44d1832dd9fb53e87fd1
SHA5126580a60bdcdfb5bd647b9e1371025e6af6891dc544a51d19133fec64452c114c82b19047e402cf4c333781d047765765b850dee828b9496e1054335254e9f308
-
Filesize
12KB
MD5ecdce9a6e4bec9623f01d627fdefc1c2
SHA1f715fbefa2981f228535e802dcaeed3f61a07a1d
SHA256c8e01f9e1e126f50bc7f86d5f4f0d885869e3744b8f736f98d5b51e96337bbeb
SHA512a23db54d27e52fd420614e50308d2c25904963f43799c65877cab57a73bf2f3902c3f134697c7586cf2ed2aea44ffee172f2861b8d52b16dd70b4732521c0401
-
Filesize
41KB
MD5f7d46418a33764dd76d7a4884d35a192
SHA1df2ac112309d82ea5e0e8c5919bb664ebedaf5c8
SHA256ff34e2440937e60d6e3ce805827a77750f407c848cad773df28a889dbefd779a
SHA5125c6fbdaa916df4d3d169d9827d64020a2d6f5195e479c3bcda52051058e37e4033eb0b1eac5ff57ac33b7b0d2046625c39fbfa494baaf7f5ece783d0c55c291d
-
Filesize
24KB
MD5159a8487c515a71e48ceacc9e098effa
SHA1bcea437733428a69c7104aeddb7a8759b2da4256
SHA2561a5d3c5c8395a11d01c6edfb4fc5389627290c26f7ee3f6e2c66a17cb348feef
SHA512f94abc5c5d14877883a2dc9191bbec01a5878f4259081ba802ec201dba3e38843d6c08cf97d8587d34c2e92309e493daff1cbf3271d58dc79ba7414a37145b69
-
Filesize
117KB
MD556eaf437dbb5838b6d1ceafe94bd0a44
SHA11148cf190f38351fe89eef07d0cfad7c20f258e1
SHA256e8c3a2548e52089865ab6f2d82e0b6c4d180632163f6823069009eb60badfd0f
SHA5126aa77519ffb5e2a4135a87d1f6dfebb00078f36eec39e0f4c52efea64037a62bec2782b9ea0957bb9990402e721cea72e7243e04f3fd15b11c73a01e493561ff
-
Filesize
14KB
MD55cdd5a7d19db669c5dac19fd6f428093
SHA17efaa63bf51aa7df4b6f6caf08475f7f0aadc3e4
SHA256a71da558e28f590becb0a6de6ef2281e993669b2d3a230a2efe558a7d717c741
SHA5125022f162f8bce1fcd8bb0f563c641641c4a169278bf1f0524ad1db13a30e63992829207740bb9ad7747fe694fed73485a85825152eb91c14afe5b3925c16e3a3
-
Filesize
11KB
MD58b32a752a174face0b6ae417890a29c2
SHA13df0d30d9b481bbf816b4915e47c29ba05164cf1
SHA256fc6288f7ac7e7341147e05d3694713c2c07c252f412bb60aa5101548abbcb51f
SHA512f16191195de4ca2b2b3070c62f90c012c12b5125227f76f8c7f3805c759a267f2c78655ba16bd04fa3a65356320be8e4873c7693108e59b8b22bdfb2104b3729
-
Filesize
70KB
MD54ce582f72671514a0a1c1c3fa2a6993f
SHA1d1c62749156b2a0449941dfbaa2442dda2946701
SHA256ecaca21fae55ac80faa37ff7ead9bcbad858a0c9af6cffc185360ee6ddd8e1e5
SHA512bbe16f68a47b900489b7511c5e33505aa37a1e7e889cc303c3eefc045ab2ac26c6c0042053e38ab5833c9be523f79621f8975e69eb8bc8b6d9babcc43b073a43