Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
0a8e65395ea7bf8477b8a6147b00aabd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a8e65395ea7bf8477b8a6147b00aabd.exe
Resource
win10v2004-20231215-en
General
-
Target
0a8e65395ea7bf8477b8a6147b00aabd.exe
-
Size
209KB
-
MD5
0a8e65395ea7bf8477b8a6147b00aabd
-
SHA1
4a408eb263019a9a09c10191a7cb7f52d2801d11
-
SHA256
dc4cadacea684d8293d14e8d178abd2917f5800d1d777bd2c3db891d2a70c403
-
SHA512
56dc23f2723f1170065ea9994565cfce09e917b775011de5b9e1ef59b26dc8773baf907f45c5520985795da1448bf4abadea6b3bedd463b50988b38f5c112b50
-
SSDEEP
6144:WlH4wMSv66OF5ol0ud3a2ymTsO9xeIEUTp2:eJBsF5M7ymTskVp2
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2168 u.dll 2832 u.dll 2752 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2820 cmd.exe 2820 cmd.exe 2820 cmd.exe 2820 cmd.exe 2832 u.dll 2832 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2820 2196 0a8e65395ea7bf8477b8a6147b00aabd.exe 29 PID 2196 wrote to memory of 2820 2196 0a8e65395ea7bf8477b8a6147b00aabd.exe 29 PID 2196 wrote to memory of 2820 2196 0a8e65395ea7bf8477b8a6147b00aabd.exe 29 PID 2196 wrote to memory of 2820 2196 0a8e65395ea7bf8477b8a6147b00aabd.exe 29 PID 2820 wrote to memory of 2168 2820 cmd.exe 30 PID 2820 wrote to memory of 2168 2820 cmd.exe 30 PID 2820 wrote to memory of 2168 2820 cmd.exe 30 PID 2820 wrote to memory of 2168 2820 cmd.exe 30 PID 2820 wrote to memory of 2832 2820 cmd.exe 33 PID 2820 wrote to memory of 2832 2820 cmd.exe 33 PID 2820 wrote to memory of 2832 2820 cmd.exe 33 PID 2820 wrote to memory of 2832 2820 cmd.exe 33 PID 2832 wrote to memory of 2752 2832 u.dll 32 PID 2832 wrote to memory of 2752 2832 u.dll 32 PID 2832 wrote to memory of 2752 2832 u.dll 32 PID 2832 wrote to memory of 2752 2832 u.dll 32 PID 2820 wrote to memory of 2532 2820 cmd.exe 31 PID 2820 wrote to memory of 2532 2820 cmd.exe 31 PID 2820 wrote to memory of 2532 2820 cmd.exe 31 PID 2820 wrote to memory of 2532 2820 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a8e65395ea7bf8477b8a6147b00aabd.exe"C:\Users\Admin\AppData\Local\Temp\0a8e65395ea7bf8477b8a6147b00aabd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ED0.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 0a8e65395ea7bf8477b8a6147b00aabd.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe2A7B.tmp"1⤵
- Executes dropped EXE
PID:2752
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
1KB
MD511ff20784bff8d994c01076b6d748ab4
SHA1d0b82ad96302fb29ba77bd13c0c22386a40c2840
SHA25661affb303bd5340c2ff65359b47bc7680693400e72dcffc2c6b29e725896bb1f
SHA51231ac474061d0b437f1828243c63cb218218d6d6ee226df97f09e7cac63fc65ee7405d2d8498615c61d45857d11d5c4aa31effb69250e56db584308a60043c292
-
Filesize
41KB
MD55a16fb75977e1799ed52f35a164922e6
SHA1c1697c61c42498f0501a886392ddd2560646b24c
SHA256f625375b30e87216e720919833d9d4e7bc11f0b61a9d2d218817d2ebb140d7de
SHA5121e31f17c0fea7df5bd321ff0015b8226a378b649c43df1111d9467b0f86f3a14e5a7ae9ed00314695f688b7cc0c18e44b3fa6521a8fea5943e4eb9a69a612216
-
Filesize
700KB
MD5863c312b1e74b57dc2d01a1370684ff3
SHA139175536b2783f4b3d70cb29d3352388cfebbcac
SHA25633c2b1a19a8b31cd969ee88acebba54c9af73d4a8633becfa609e067909db33a
SHA512d6dcd4968bd18b3483f7fb6a63b9640d8d3f3fc63bccd5c0ba294c1f09fc9b6bcb4fae815682d5800f7acf34fdadd2ec54be7d728d754a46b9cdb2362b3fa76d
-
Filesize
1KB
MD573615bb4ea7c2ff6814e2570ae45c43c
SHA146cabb935593f06f5a925df8f320f5df1260ddbb
SHA2567710bdc3ad221d6aa9827ce72c0f6bbd41f8726256a224519743a4e1a19d6b98
SHA512684a597765396a5b9292ee191f1ec70723a66b9c1e6519e04e6d6813023d59b9104b59b60d7144d962ef75b7c434c97c7bdc2684481fd8ed828fb1cf12ba7588
-
Filesize
1KB
MD5697873da0a6ab4aa236a2be7e6de0a02
SHA1108184af36bcbb4164b0dd9c4f2afac5d1647687
SHA256b597cd214bdb62ba186f6463ceecd3d1205bc10ab3a425eca5f0e9a9d6acde73
SHA512957cb9457917e8afdb4133ec687b919087b402e35d1476075eeb06c02f12f7130fb9fbfa226d98215891c62496c22c82ee9332ec6c9fae384ad80dd5bb79a8e0