Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 02:56
Behavioral task
behavioral1
Sample
014653d6b17f29083cbb62debb2993fc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
014653d6b17f29083cbb62debb2993fc.exe
Resource
win10v2004-20231215-en
General
-
Target
014653d6b17f29083cbb62debb2993fc.exe
-
Size
8.6MB
-
MD5
014653d6b17f29083cbb62debb2993fc
-
SHA1
710416458c5c0e75aa3d836d64d1f4da5f20b2c2
-
SHA256
c8a40e8a075c7702f16de499dadbe7a8f437579eef39cf980835d111c8cdf173
-
SHA512
3ecedcfa701541c3fd09f272863a11b39f7217fac86fd5d7b58340bba6fed31fac6bf763173a20cc1dff851d4f448dbadc1e04b26d84a70d833b31dd4468e48e
-
SSDEEP
196608:pyq4a9r9hPj5hKAeLykkEU7wiMPnH/ELax32OGgVVPqLp29Bn:pyqF15haLyjEU7wzPld2ePqc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos -
Executes dropped EXE 1 IoCs
pid Process 2752 zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos -
Loads dropped DLL 1 IoCs
pid Process 2108 014653d6b17f29083cbb62debb2993fc.exe -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect behavioral1/memory/2108-7-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect behavioral1/files/0x000b000000012243-15.dat vmprotect behavioral1/files/0x000b000000012243-18.dat vmprotect behavioral1/files/0x000b000000012243-19.dat vmprotect behavioral1/memory/2752-21-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect behavioral1/memory/2108-29-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect behavioral1/memory/2752-30-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect behavioral1/memory/2752-43-0x0000000000400000-0x00000000015DA000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 014653d6b17f29083cbb62debb2993fc.exe 2752 zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2108 014653d6b17f29083cbb62debb2993fc.exe 2108 014653d6b17f29083cbb62debb2993fc.exe 2752 zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos 2752 zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2752 2108 014653d6b17f29083cbb62debb2993fc.exe 28 PID 2108 wrote to memory of 2752 2108 014653d6b17f29083cbb62debb2993fc.exe 28 PID 2108 wrote to memory of 2752 2108 014653d6b17f29083cbb62debb2993fc.exe 28 PID 2108 wrote to memory of 2752 2108 014653d6b17f29083cbb62debb2993fc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\014653d6b17f29083cbb62debb2993fc.exe"C:\Users\Admin\AppData\Local\Temp\014653d6b17f29083cbb62debb2993fc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldosC:\Users\Admin\AppData\Local\Temp\zsdbfkbolxhzkdosvfkvhmvmikbspvtfdzgxpqiaeccsnbjdpm.ssltssldos C:\Users\Admin\AppData\Local\Temp\014653d6b17f29083cbb62debb2993fc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5ba0e09c965ffb6ed9c44a6681cdfd6a5
SHA198f917d5ab77dcb5d4184de72398928aef6293a5
SHA256e226424995984530eaa5630912db12694a9a3769e1335459522dad083f2358ac
SHA5122c2f82a2a53c111fafce0d6d7c50306df5acedb0092199427194448134fd75be82664aaf03b92610a027b784ef7d70e378ef3094ea589782d270892fa2a4248d
-
Filesize
2.0MB
MD51e8c38e0c72cec085325e177e4f2b284
SHA19847e1b651e4da5788db75fff33e671f05cb67f1
SHA25603ea1c678c74feea8fe8c244492ed3a3e61ee09d53409e206dd0cb0f6cc0f745
SHA51203694e72756673b7670d5451d97269a39cfc501a2c5e7c35e3775d87276dd5e1d6bc2cc1a8ecd1d1f53421a11752931a58377fa25b8386992247ce7031525219
-
Filesize
2.1MB
MD5c1ca136ebe7ffb8103f652d041fc37f0
SHA1646e0f2ac71b68d900f7fcce00cce4e3a55b5fbf
SHA2566bd0cd18224598708423d8288d29527c50962b10fbb0a02cd009b4d986b8f8d4
SHA512ccbc2c7b2fb454d642bff7fc66109e2e9145d7d28adb486a934983d0588536cfd66f2bc535cc44f7cca48373a47c5e6975c474aa6648de37adfb22f4bf148e4e
-
Filesize
1.2MB
MD584e7e7fbb356a81f003ab9254f20d934
SHA1eadf0eab5f7f26a07e07fce80dd8858a8ec1d2f7
SHA25681b7fa6a097c1774085860fa1cab3118d9a9062cb2b3cc137898e6a291f0d4e2
SHA512f2706b30f40c73f995299a9b6007805694dc5c3fff2c4666405f105b907409d326a01fcd33ed55c99de896045863774cca3249ed1493592779f345983ce3ec80