Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:40
Behavioral task
behavioral1
Sample
2a00b62238dc7cb012bdf7b9a54ede28.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a00b62238dc7cb012bdf7b9a54ede28.exe
Resource
win10v2004-20231215-en
General
-
Target
2a00b62238dc7cb012bdf7b9a54ede28.exe
-
Size
5KB
-
MD5
2a00b62238dc7cb012bdf7b9a54ede28
-
SHA1
76d4d8786d6be30947088fffa0e6f49975619af3
-
SHA256
79fa11cd987a5dcb93bd825c36f6d02aa8cf4d70d833c202582abcbad217313b
-
SHA512
2df9906524b1e10111e7ed59a00fb68f5cbbe5424355f3536f21c3346d010c83e05553ef6d6133d358034a4a8fb36a64cd055a711cb270046fd3757ec89cf31f
-
SSDEEP
96:CNt+pzoLhm68cZKbukdqI1IdVZG4nFwNVGL2ErTvXZz:CNt+p8Lhm68QONcZG4neN3gZz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2976 winsys.exe 2676 systemexe.exe 2168 windaemon.exe 2864 winxpud.exe -
resource yara_rule behavioral1/memory/3036-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/files/0x000a000000012233-5.dat upx behavioral1/memory/2976-18-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2976-29-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2676-34-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2676-33-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2168-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2168-47-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/3036-56-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/3036-57-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2864-62-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2864-61-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\systemexe.exe 2a00b62238dc7cb012bdf7b9a54ede28.exe File created C:\Windows\windaemon.exe 2a00b62238dc7cb012bdf7b9a54ede28.exe File created C:\Windows\winxpud.exe 2a00b62238dc7cb012bdf7b9a54ede28.exe File created C:\Windows\winsys.exe 2a00b62238dc7cb012bdf7b9a54ede28.exe File opened for modification C:\Windows\winsys.exe 2a00b62238dc7cb012bdf7b9a54ede28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2976 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 28 PID 3036 wrote to memory of 2976 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 28 PID 3036 wrote to memory of 2976 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 28 PID 3036 wrote to memory of 2976 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 28 PID 3036 wrote to memory of 2676 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 29 PID 3036 wrote to memory of 2676 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 29 PID 3036 wrote to memory of 2676 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 29 PID 3036 wrote to memory of 2676 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 29 PID 3036 wrote to memory of 2168 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 30 PID 3036 wrote to memory of 2168 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 30 PID 3036 wrote to memory of 2168 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 30 PID 3036 wrote to memory of 2168 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 30 PID 3036 wrote to memory of 2864 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 31 PID 3036 wrote to memory of 2864 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 31 PID 3036 wrote to memory of 2864 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 31 PID 3036 wrote to memory of 2864 3036 2a00b62238dc7cb012bdf7b9a54ede28.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a00b62238dc7cb012bdf7b9a54ede28.exe"C:\Users\Admin\AppData\Local\Temp\2a00b62238dc7cb012bdf7b9a54ede28.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\winsys.exe"C:\Windows\winsys.exe"2⤵
- Executes dropped EXE
PID:2976
-
-
C:\Windows\systemexe.exe"C:\Windows\systemexe.exe"2⤵
- Executes dropped EXE
PID:2676
-
-
C:\Windows\windaemon.exe"C:\Windows\windaemon.exe"2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\winxpud.exe"C:\Windows\winxpud.exe"2⤵
- Executes dropped EXE
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD52a00b62238dc7cb012bdf7b9a54ede28
SHA176d4d8786d6be30947088fffa0e6f49975619af3
SHA25679fa11cd987a5dcb93bd825c36f6d02aa8cf4d70d833c202582abcbad217313b
SHA5122df9906524b1e10111e7ed59a00fb68f5cbbe5424355f3536f21c3346d010c83e05553ef6d6133d358034a4a8fb36a64cd055a711cb270046fd3757ec89cf31f