Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
1094b89a4c6b041249eed29570daac04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1094b89a4c6b041249eed29570daac04.exe
Resource
win10v2004-20231222-en
General
-
Target
1094b89a4c6b041249eed29570daac04.exe
-
Size
1.3MB
-
MD5
1094b89a4c6b041249eed29570daac04
-
SHA1
dee227a62dc7521f46f37eaca8a0d33513e102bc
-
SHA256
cf3265ddd8a7c75fe5a40ec8f57185175c413b074bdf3cb654fe8e65198e26b8
-
SHA512
28c9ab5e5bf3a312cbf1d588fe719ff080a626a8c079a8eed8abdf687521ee02b5a3199b7a034408d9c8e7b143700245db9223cdd3637a901e60467f8da4d985
-
SSDEEP
24576:abGAEhADYqbFR9A7aCIwYJTRCc33q73vk/Zs8zJNCmHUPxlqFPB7A9g1N:8Eh8bjUc33q7/eZXUPqPBc0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1952 Monobole.EXE 2760 tmp.tmp.tmp1 -
resource yara_rule behavioral1/memory/2444-18-0x0000000002650000-0x00000000026BD000-memory.dmp upx behavioral1/memory/2760-19-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/files/0x000d0000000122cf-17.dat upx behavioral1/memory/2760-23-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SMSSS.bat tmp.tmp.tmp1 File opened for modification C:\Windows\SysWOW64\SMSSS.bat tmp.tmp.tmp1 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Monobole.EXE 1094b89a4c6b041249eed29570daac04.exe File opened for modification C:\Windows\tmp.tmp.tmp1 1094b89a4c6b041249eed29570daac04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2444 1094b89a4c6b041249eed29570daac04.exe 2760 tmp.tmp.tmp1 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2444 wrote to memory of 1952 2444 1094b89a4c6b041249eed29570daac04.exe 28 PID 2444 wrote to memory of 1952 2444 1094b89a4c6b041249eed29570daac04.exe 28 PID 2444 wrote to memory of 1952 2444 1094b89a4c6b041249eed29570daac04.exe 28 PID 2444 wrote to memory of 1952 2444 1094b89a4c6b041249eed29570daac04.exe 28 PID 2444 wrote to memory of 2760 2444 1094b89a4c6b041249eed29570daac04.exe 29 PID 2444 wrote to memory of 2760 2444 1094b89a4c6b041249eed29570daac04.exe 29 PID 2444 wrote to memory of 2760 2444 1094b89a4c6b041249eed29570daac04.exe 29 PID 2444 wrote to memory of 2760 2444 1094b89a4c6b041249eed29570daac04.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1094b89a4c6b041249eed29570daac04.exe"C:\Users\Admin\AppData\Local\Temp\1094b89a4c6b041249eed29570daac04.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Monobole.EXE"C:\Windows\Monobole.EXE"2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Windows\tmp.tmp.tmp1C:\Windows\tmp.tmp.tmp12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5b5c8315431bf8351bb77424f15fdc359
SHA17add6c995e1925f6fb4bf1fc5c07b8043cc71c61
SHA25666a366391c212badb0ab16ef991b79359b044759abbfb598d43962231ec49236
SHA51287419323a17615a47666ed22d96131e13d5e8a7a9dad3271aa106f65806e8708218dbfe51e275f965ba5d05bec07057650f3d5332817f06657d53ea4e6f3c6ab
-
Filesize
101KB
MD5afd3ad021ddab1cad2cfbafe0379e699
SHA13cc8a82ed9beb093e3d0614ae22c6a441812897b
SHA256bc11112c374a0197cbfa2fdf826398e39d82b8fe00de160cce78a76689cd4d3c
SHA5128827d631beb29bf005b45750af90a26ffd1836e186758beeb628134598904e5837633ca1c37bf7d6fc957725b25410f8ee55435134a0833714be3c5a0352241a