Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 23:28
Behavioral task
behavioral1
Sample
43391bf33958bbfeb2ad07da7739bd6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43391bf33958bbfeb2ad07da7739bd6d.exe
Resource
win10v2004-20231215-en
General
-
Target
43391bf33958bbfeb2ad07da7739bd6d.exe
-
Size
298KB
-
MD5
43391bf33958bbfeb2ad07da7739bd6d
-
SHA1
862f5ff99582d5d8645c81621894710ae7ae0045
-
SHA256
a9bcdd75d2b08e7d62ab9ff79de805d35abd9fc5667ddaea872b58066889eeb0
-
SHA512
30e778c09f0b286bc46b3ec7aad06d99a79a1a00310bfab933ec20d1f735b738da169e75b43fcf687fa67793c557943499ef181d31f33021534d85a64f2775e1
-
SSDEEP
6144:X9gran558yUzFul0mWcLVlGxGPCyl7Y3sdbj0j00s1wpZIU2aADkXiLAj6inP7:X9gGngyiFul0mNAsCyZH0jPI+oDkXiLS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1628-0-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3516-4-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3516-3-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3516-5-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/3516-8-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/memory/1628-6-0x0000000000400000-0x00000000004AE000-memory.dmp upx behavioral2/files/0x0006000000023205-10.dat upx behavioral2/memory/3516-11-0x0000000000400000-0x00000000004AE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KtxirlF = "c:\\ProgramData\\EiqulaV\\IlslpwA\\KtxirlF.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88 PID 1628 wrote to memory of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88 PID 1628 wrote to memory of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88 PID 1628 wrote to memory of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88 PID 1628 wrote to memory of 3516 1628 43391bf33958bbfeb2ad07da7739bd6d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\43391bf33958bbfeb2ad07da7739bd6d.exe"C:\Users\Admin\AppData\Local\Temp\43391bf33958bbfeb2ad07da7739bd6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Adds Run key to start application
PID:3516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD543391bf33958bbfeb2ad07da7739bd6d
SHA1862f5ff99582d5d8645c81621894710ae7ae0045
SHA256a9bcdd75d2b08e7d62ab9ff79de805d35abd9fc5667ddaea872b58066889eeb0
SHA51230e778c09f0b286bc46b3ec7aad06d99a79a1a00310bfab933ec20d1f735b738da169e75b43fcf687fa67793c557943499ef181d31f33021534d85a64f2775e1