Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f0eeb128d467aa69c3ee8afceb4206c.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
3f0eeb128d467aa69c3ee8afceb4206c.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3f0eeb128d467aa69c3ee8afceb4206c.exe
-
Size
208KB
-
MD5
3f0eeb128d467aa69c3ee8afceb4206c
-
SHA1
20b19a17a689f25b611ead0c6dacdbe922a2c204
-
SHA256
3d707a5879b188d1e64cb8e1d72514d12081bd9188006057d4dc95c3e29edebf
-
SHA512
6e0f80a1ba9c57f54138f583339da120210b1b8d09967456d43545882a36e33c163f3f104ca77503b01642997e1e991ab9f2746f3177bbc94c2459a18e39309b
-
SSDEEP
6144:VlGRgXm15iT5EvNjIrhgUNQYqovv3UsnoZKC:mv1LvurhgUNQZovss
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2172 u.dll 2612 u.dll 2584 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 1748 cmd.exe 1748 cmd.exe 1748 cmd.exe 1748 cmd.exe 2612 u.dll 2612 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1748 2188 3f0eeb128d467aa69c3ee8afceb4206c.exe 17 PID 2188 wrote to memory of 1748 2188 3f0eeb128d467aa69c3ee8afceb4206c.exe 17 PID 2188 wrote to memory of 1748 2188 3f0eeb128d467aa69c3ee8afceb4206c.exe 17 PID 2188 wrote to memory of 1748 2188 3f0eeb128d467aa69c3ee8afceb4206c.exe 17 PID 1748 wrote to memory of 2172 1748 cmd.exe 16 PID 1748 wrote to memory of 2172 1748 cmd.exe 16 PID 1748 wrote to memory of 2172 1748 cmd.exe 16 PID 1748 wrote to memory of 2172 1748 cmd.exe 16 PID 1748 wrote to memory of 2612 1748 cmd.exe 33 PID 1748 wrote to memory of 2612 1748 cmd.exe 33 PID 1748 wrote to memory of 2612 1748 cmd.exe 33 PID 1748 wrote to memory of 2612 1748 cmd.exe 33 PID 2612 wrote to memory of 2584 2612 u.dll 32 PID 2612 wrote to memory of 2584 2612 u.dll 32 PID 2612 wrote to memory of 2584 2612 u.dll 32 PID 2612 wrote to memory of 2584 2612 u.dll 32 PID 1748 wrote to memory of 1424 1748 cmd.exe 31 PID 1748 wrote to memory of 1424 1748 cmd.exe 31 PID 1748 wrote to memory of 1424 1748 cmd.exe 31 PID 1748 wrote to memory of 1424 1748 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 3f0eeb128d467aa69c3ee8afceb4206c.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\EB0.tmp\vir.bat""1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\calc.exeCALC.EXE2⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\3f0eeb128d467aa69c3ee8afceb4206c.exe"C:\Users\Admin\AppData\Local\Temp\3f0eeb128d467aa69c3ee8afceb4206c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe2A8B.tmp"1⤵
- Executes dropped EXE
PID:2584