Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 14:45
Static task
static1
Behavioral task
behavioral1
Sample
26a8eb35ac1417b9df17d692bf054f0b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
26a8eb35ac1417b9df17d692bf054f0b.exe
Resource
win10v2004-20231215-en
General
-
Target
26a8eb35ac1417b9df17d692bf054f0b.exe
-
Size
209KB
-
MD5
26a8eb35ac1417b9df17d692bf054f0b
-
SHA1
799ef234ecc29c88595b3b973e063e3a69317a6f
-
SHA256
f730a3cfb5381f8d00dfedfd5443274512a46511006743159c92563fadddac8c
-
SHA512
339f5a7e173dc8da3eabfa0dc186c49ddd1b95381dec902d37b5de09a2064b96a9c1947281afb4ac6aa919774288adab44bc3e8e62527e116e7b97a125890ceb
-
SSDEEP
6144:8lNgws6Fchn400fz94pVaFf972DOLJX0vv45:8hs6Sh4B4KF726L9ev
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2764 u.dll 2628 u.dll 2504 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2884 cmd.exe 2884 cmd.exe 2884 cmd.exe 2884 cmd.exe 2628 u.dll 2628 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2884 3040 26a8eb35ac1417b9df17d692bf054f0b.exe 29 PID 3040 wrote to memory of 2884 3040 26a8eb35ac1417b9df17d692bf054f0b.exe 29 PID 3040 wrote to memory of 2884 3040 26a8eb35ac1417b9df17d692bf054f0b.exe 29 PID 3040 wrote to memory of 2884 3040 26a8eb35ac1417b9df17d692bf054f0b.exe 29 PID 2884 wrote to memory of 2764 2884 cmd.exe 30 PID 2884 wrote to memory of 2764 2884 cmd.exe 30 PID 2884 wrote to memory of 2764 2884 cmd.exe 30 PID 2884 wrote to memory of 2764 2884 cmd.exe 30 PID 2884 wrote to memory of 2628 2884 cmd.exe 31 PID 2884 wrote to memory of 2628 2884 cmd.exe 31 PID 2884 wrote to memory of 2628 2884 cmd.exe 31 PID 2884 wrote to memory of 2628 2884 cmd.exe 31 PID 2628 wrote to memory of 2504 2628 u.dll 32 PID 2628 wrote to memory of 2504 2628 u.dll 32 PID 2628 wrote to memory of 2504 2628 u.dll 32 PID 2628 wrote to memory of 2504 2628 u.dll 32 PID 2884 wrote to memory of 320 2884 cmd.exe 33 PID 2884 wrote to memory of 320 2884 cmd.exe 33 PID 2884 wrote to memory of 320 2884 cmd.exe 33 PID 2884 wrote to memory of 320 2884 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a8eb35ac1417b9df17d692bf054f0b.exe"C:\Users\Admin\AppData\Local\Temp\26a8eb35ac1417b9df17d692bf054f0b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1AF0.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 26a8eb35ac1417b9df17d692bf054f0b.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\36F8.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\36F8.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe36F9.tmp"4⤵
- Executes dropped EXE
PID:2504
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:320
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5468426ee889925f13ffc2f79863b827d
SHA1b88acd322486eef3e9199f9c287d3f93253c29a2
SHA256ea25766c36525bed15362b281484d633897585fa9deb07c85afd73b79e1add56
SHA5124313e2c7137c4140b9a0278be939edf14fc7d142401a53457e5f5428c652f3da9a6879fde902bebe741c3f5f809bac7be30dbbf1e7ad8c19da095abbb6e54d7f
-
Filesize
24KB
MD51c591a621b30fb31de8b83694bffdb57
SHA194b0acf10c424c4990f88d8d63ba0ef31231fde8
SHA25671a4439b7c9ba5b21532c4e3c05f39fd19f2ad9e8f1e7da85244339f7fac0e3d
SHA5124921aee10a3d419ebbfad7f9f877177fce6aad5a1084099046f97ee63d577d9f54d42b6de5ca256f5250264f929988fbd8e4e050996673c99d95dae8833abe2f
-
Filesize
41KB
MD5cfb6c23b4ec82cb8a0c562d2b9f34c23
SHA1c7b496195abf2cceb09d8536768d83ab4aed6687
SHA25628feed5f31044cbc96b185cd8ac0b12cffbc848b895ffce7d4005e25f7a8faff
SHA51255a2e71b87db5af46c90eab14f95534d0deed807e91c4a52fb762141972a051633decedaf41b19b857efe8fd24821b59e15b33c9e00073da094495ea316420ac
-
Filesize
700KB
MD50ba8f8311fc3afbb7e32d98236f2efa6
SHA1956dd3548df11f2c6c36366d74109ddddc33fc33
SHA2565b6da37dd4f1fa6402e7ee652ef048f7bd7b396f7a3b3f61c56865d5cd3f6e62
SHA512706f455d004af6d1442402c1a750a37da14da0351c51d0b0b578349355956986941c4a302956590be7c2b00caa6838e3b265dab8766e8636e0c6c4527b82c4e2
-
Filesize
1KB
MD569332f03fce13f80403f3615e914112b
SHA10e2175ba923ca3ab973f40713ece1e92650bb16c
SHA25693f82cb92dbd9c339f1e12c3496d663ba99cd4ac66d82c67b51c5fd75a901dd1
SHA51298dbbd0689a0fa812de368400979897346e23b58dec2677301de5627441955bb37e917e8a9fe81cbf00a4264dece5330e477bf5bf33b15cc072c33dee07fb6bd
-
Filesize
1KB
MD54b61a5fa40e63e773ff718a04517a924
SHA156bd1f6e5b81acae558a87f92a56c4fd1346d768
SHA2565129393e5e73aea6d14156877bd02a9434b9d901e549ae8e90549f5175e8c7f1
SHA512f5e3fe1586d150f65437397c875f47f0340f86fb5fe9670941be3fa358866ddce392eb203526b9da143579ea20906d13ea6ac74135458037e054e1983eb6a172
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e