Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
2631b9a0e662e017e2488b7aec2bd7c9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2631b9a0e662e017e2488b7aec2bd7c9.exe
Resource
win10v2004-20231222-en
General
-
Target
2631b9a0e662e017e2488b7aec2bd7c9.exe
-
Size
209KB
-
MD5
2631b9a0e662e017e2488b7aec2bd7c9
-
SHA1
3dd3566ced59c93ada9d835cb29375852fa0a400
-
SHA256
bc790d625820e5dc84ffc42f7c634ea635f544b855599fd94920d1eaf4e677e6
-
SHA512
080130d1d691310b40f7a9da8891e70e68a5372cbacb888dc4cd0972bb8d12dffb137d72e4d74ad9bbf7e8ad481c2e1f3103d684abc0da0dc6869311c85b8115
-
SSDEEP
6144:6li5vOmAze306/TiiHzXc0egPUz3lE1UbKH:5Zuy/TiyXxegIU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 820 u.dll 2568 u.dll 2424 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 868 cmd.exe 868 cmd.exe 868 cmd.exe 868 cmd.exe 2568 u.dll 2568 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2216 wrote to memory of 868 2216 2631b9a0e662e017e2488b7aec2bd7c9.exe 15 PID 2216 wrote to memory of 868 2216 2631b9a0e662e017e2488b7aec2bd7c9.exe 15 PID 2216 wrote to memory of 868 2216 2631b9a0e662e017e2488b7aec2bd7c9.exe 15 PID 2216 wrote to memory of 868 2216 2631b9a0e662e017e2488b7aec2bd7c9.exe 15 PID 868 wrote to memory of 820 868 cmd.exe 14 PID 868 wrote to memory of 820 868 cmd.exe 14 PID 868 wrote to memory of 820 868 cmd.exe 14 PID 868 wrote to memory of 820 868 cmd.exe 14 PID 868 wrote to memory of 2568 868 cmd.exe 33 PID 868 wrote to memory of 2568 868 cmd.exe 33 PID 868 wrote to memory of 2568 868 cmd.exe 33 PID 868 wrote to memory of 2568 868 cmd.exe 33 PID 2568 wrote to memory of 2424 2568 u.dll 32 PID 2568 wrote to memory of 2424 2568 u.dll 32 PID 2568 wrote to memory of 2424 2568 u.dll 32 PID 2568 wrote to memory of 2424 2568 u.dll 32 PID 868 wrote to memory of 2804 868 cmd.exe 31 PID 868 wrote to memory of 2804 868 cmd.exe 31 PID 868 wrote to memory of 2804 868 cmd.exe 31 PID 868 wrote to memory of 2804 868 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 2631b9a0e662e017e2488b7aec2bd7c9.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
PID:820
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\E24.tmp\vir.bat""1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\calc.exeCALC.EXE2⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\2631b9a0e662e017e2488b7aec2bd7c9.exe"C:\Users\Admin\AppData\Local\Temp\2631b9a0e662e017e2488b7aec2bd7c9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe2A2D.tmp"1⤵
- Executes dropped EXE
PID:2424
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f4e056560d3169270325f69da494f7b8
SHA10f3b66401cdb1b935bcfc80927490ae896ab6f7c
SHA256e0a987bb0d8abb1d45263aa813df6ed3e1a411647d9872093fc1cf869c24c275
SHA51262691de57efb468ca22aad3dbd03aa6106cd0b038509d395e248916544d221f0b0f312ccb175f7748c0336f4a5cc1ec2d1635e306d01121e7b70ddddbaf320f3
-
Filesize
92KB
MD53ead3d1666a7ba5496ca7f0bdba490e6
SHA11c2707e1ed0b80eceb9e222e7c12e922e1ad1a13
SHA2569c86a7b9cbd93a18253b5101b8a4272f9396e752177b5a49520384df06f18f5d
SHA512147d684c5f73aa2aadc05c01c9aa31e887242edf53b97f151024ddf84384b2517dc6bd9a7bb52d9c607f47583b7b4868e809ad042e7f8e951e6a331004c62335