Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
18ba893da27542c888e2340b1058d4bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18ba893da27542c888e2340b1058d4bb.exe
Resource
win10v2004-20231215-en
General
-
Target
18ba893da27542c888e2340b1058d4bb.exe
-
Size
206KB
-
MD5
18ba893da27542c888e2340b1058d4bb
-
SHA1
29dbdc7260e2caf95dd2c6563dfce3f93b7ea5aa
-
SHA256
e347ae853e3f00eb2dd07ff9b61410e057d9dd8125e460174661107aa8f47b4f
-
SHA512
0e3dfe5fe6a4e805abfcf287d73fb57943210208982c61c758395db439503a4171df86bcf4cf0011ef9c462442f4370ed4116bd7f058f9f74d55845ea18f115b
-
SSDEEP
3072:EwPCR2h7VW+A39oMMQUbeb5bDjRmR3hQJ1F4yhckjnJM/vF4mutOdiMlpMLBsjU9:E1aa9bUZzK5JUNdiFLBk0xpzOl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4492 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4492 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NikLikakaFamiLi = "c:\\program files\\svchost.exe" svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created \??\c:\program files\svchost.exe 18ba893da27542c888e2340b1058d4bb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4492 4272 18ba893da27542c888e2340b1058d4bb.exe 92 PID 4272 wrote to memory of 4492 4272 18ba893da27542c888e2340b1058d4bb.exe 92 PID 4272 wrote to memory of 4492 4272 18ba893da27542c888e2340b1058d4bb.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\18ba893da27542c888e2340b1058d4bb.exe"C:\Users\Admin\AppData\Local\Temp\18ba893da27542c888e2340b1058d4bb.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4272 -
\??\c:\program files\svchost.exe"c:\program files\svchost.exe" C:\Users\Admin\AppData\Local\Temp\18ba893da27542c888e2340b1058d4bb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
PID:4492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5c55fa353c4da47274d6b82f0f9932119
SHA1a65e65e37e7440fae5bac52a12986754fe2fb625
SHA25631a37792ec57f6a38abc0f8e94bff2c46cde059548ead7fa048aaef9cdad6ca8
SHA512155e40b5cfd85b5441e95312efa043859b8489b8a9da131ba5ac6d6499119088c4da3198fb64bd3017064d0a8e8d7a6bf1b0705209390af99cfe257b98440837