Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:28
Behavioral task
behavioral1
Sample
43391bf33958bbfeb2ad07da7739bd6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43391bf33958bbfeb2ad07da7739bd6d.exe
Resource
win10v2004-20231215-en
General
-
Target
43391bf33958bbfeb2ad07da7739bd6d.exe
-
Size
298KB
-
MD5
43391bf33958bbfeb2ad07da7739bd6d
-
SHA1
862f5ff99582d5d8645c81621894710ae7ae0045
-
SHA256
a9bcdd75d2b08e7d62ab9ff79de805d35abd9fc5667ddaea872b58066889eeb0
-
SHA512
30e778c09f0b286bc46b3ec7aad06d99a79a1a00310bfab933ec20d1f735b738da169e75b43fcf687fa67793c557943499ef181d31f33021534d85a64f2775e1
-
SSDEEP
6144:X9gran558yUzFul0mWcLVlGxGPCyl7Y3sdbj0j00s1wpZIU2aADkXiLAj6inP7:X9gGngyiFul0mNAsCyZH0jPI+oDkXiLS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2416-0-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/3032-7-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/2416-9-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/3032-8-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/3032-10-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/3032-11-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/memory/3032-12-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral1/files/0x0007000000015e09-14.dat upx behavioral1/memory/3032-15-0x0000000000400000-0x00000000004AE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\LluhojB = "c:\\ProgramData\\IdesbeN\\BndlpnB\\LluhojB.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28 PID 2416 wrote to memory of 3032 2416 43391bf33958bbfeb2ad07da7739bd6d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\43391bf33958bbfeb2ad07da7739bd6d.exe"C:\Users\Admin\AppData\Local\Temp\43391bf33958bbfeb2ad07da7739bd6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Adds Run key to start application
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD543391bf33958bbfeb2ad07da7739bd6d
SHA1862f5ff99582d5d8645c81621894710ae7ae0045
SHA256a9bcdd75d2b08e7d62ab9ff79de805d35abd9fc5667ddaea872b58066889eeb0
SHA51230e778c09f0b286bc46b3ec7aad06d99a79a1a00310bfab933ec20d1f735b738da169e75b43fcf687fa67793c557943499ef181d31f33021534d85a64f2775e1