Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 03:24
Behavioral task
behavioral1
Sample
02d39bdf042aa00c8bbc6a6dc2549b71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02d39bdf042aa00c8bbc6a6dc2549b71.exe
Resource
win10v2004-20231215-en
General
-
Target
02d39bdf042aa00c8bbc6a6dc2549b71.exe
-
Size
963KB
-
MD5
02d39bdf042aa00c8bbc6a6dc2549b71
-
SHA1
190576579181f53d5920b470a795f454acbdb823
-
SHA256
4ffcef811b06685f47df5b5118ab7aded2d438064e76199373b22584921071c2
-
SHA512
fae9b2ba344220a36106b6102cf21d90a9880aad6efed519ab01ab596220888baaaf493a8a2ea1263d82c95fddcb75aa6443b6cd46d05b9f177198a9e84b059b
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27QitjrHANUTNZ0i:r5sJo6YrFUiyAak11Ltjx0i
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4808 svchest425075242507520.exe -
resource yara_rule behavioral2/memory/3200-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/3200-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4808-12-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4808-10-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/files/0x0008000000023212-8.dat upx behavioral2/files/0x0008000000023212-7.dat upx behavioral2/memory/3200-13-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\02d39bdf042aa00c8bbc6a6dc2549b71.exe" 02d39bdf042aa00c8bbc6a6dc2549b71.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3200 02d39bdf042aa00c8bbc6a6dc2549b71.exe 4808 svchest425075242507520.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 02d39bdf042aa00c8bbc6a6dc2549b71.exe File opened for modification \??\c:\Windows\BJ.exe 02d39bdf042aa00c8bbc6a6dc2549b71.exe File created \??\c:\Windows\svchest425075242507520.exe 02d39bdf042aa00c8bbc6a6dc2549b71.exe File opened for modification \??\c:\Windows\svchest425075242507520.exe 02d39bdf042aa00c8bbc6a6dc2549b71.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4808 3200 02d39bdf042aa00c8bbc6a6dc2549b71.exe 20 PID 3200 wrote to memory of 4808 3200 02d39bdf042aa00c8bbc6a6dc2549b71.exe 20 PID 3200 wrote to memory of 4808 3200 02d39bdf042aa00c8bbc6a6dc2549b71.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\02d39bdf042aa00c8bbc6a6dc2549b71.exe"C:\Users\Admin\AppData\Local\Temp\02d39bdf042aa00c8bbc6a6dc2549b71.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD58bcb4a51eb19715ce383a6e695aeb608
SHA1b1e771a83c9c84f3271d117121658f71c8e526d2
SHA2563a41afea7447dcb5b343b7b0b9623db4f74f9e240931730dbd2b8b06c2f0c457
SHA51253112b0e2941bc259390dc1d037cebf164b22ed93c121beb72402f791474b8b88583dddc397d2cbc8e6249938bb4dc050d353943ee0d316b32d6c3283a814753