Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 14:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24b7cdd385e9eab759cfca0b3a93b6a3.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
24b7cdd385e9eab759cfca0b3a93b6a3.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
24b7cdd385e9eab759cfca0b3a93b6a3.exe
-
Size
40KB
-
MD5
24b7cdd385e9eab759cfca0b3a93b6a3
-
SHA1
41b21479479c9a6671a445c0faa2a39675e6498b
-
SHA256
525127dcf47710854d6a7dc973c3e194c9143a9cd380585bc13da7d3a57a0959
-
SHA512
56454c68b6e9e44db2f86b79617a6849e453c9583d88bd13a8da63f8c8e98198c63cb339227e02959fde573083042b879f497d3ee0e2984b5aea1bd8f11f5986
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtH4:aqk/Zdic/qjh8w19JDH4
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1752 services.exe -
resource yara_rule behavioral1/memory/1752-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/640-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/memory/1752-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1752-36-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 24b7cdd385e9eab759cfca0b3a93b6a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 24b7cdd385e9eab759cfca0b3a93b6a3.exe File opened for modification C:\Windows\java.exe 24b7cdd385e9eab759cfca0b3a93b6a3.exe File created C:\Windows\java.exe 24b7cdd385e9eab759cfca0b3a93b6a3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 640 wrote to memory of 1752 640 24b7cdd385e9eab759cfca0b3a93b6a3.exe 16 PID 640 wrote to memory of 1752 640 24b7cdd385e9eab759cfca0b3a93b6a3.exe 16 PID 640 wrote to memory of 1752 640 24b7cdd385e9eab759cfca0b3a93b6a3.exe 16 PID 640 wrote to memory of 1752 640 24b7cdd385e9eab759cfca0b3a93b6a3.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b7cdd385e9eab759cfca0b3a93b6a3.exe"C:\Users\Admin\AppData\Local\Temp\24b7cdd385e9eab759cfca0b3a93b6a3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1752
-