Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
2826da09d12953f75a1b13444a03dfe9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2826da09d12953f75a1b13444a03dfe9.exe
Resource
win10v2004-20231215-en
General
-
Target
2826da09d12953f75a1b13444a03dfe9.exe
-
Size
4.5MB
-
MD5
2826da09d12953f75a1b13444a03dfe9
-
SHA1
1f183b86f9140fa54ae3bef9862aeea3e33cb289
-
SHA256
523119cba40fc37d1999ba51850376130233091c6ed74a0832dbbced9799b154
-
SHA512
6ede86948f99e6dc2c02b8831e90727ad9fc99c4d96a54e101282a55b22d5e9b53925f9e689cd6f957e77021fafbf1365d9cdcc850587c789b4a502b38261a02
-
SSDEEP
98304:hjX2TR/+9g+1wLgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk8411bFmL1OVYIl:c1+vJiPD3Nm7AJEgLYX8CNYzQEr0WO01
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\OOARDIOQ\hosts 2826da09dRKJQ.exe -
Executes dropped EXE 1 IoCs
pid Process 3516 2826da09dRKJQ.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 208 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3516 2826da09dRKJQ.exe 3516 2826da09dRKJQ.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3516 2826da09dRKJQ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3516 2512 2826da09d12953f75a1b13444a03dfe9.exe 91 PID 2512 wrote to memory of 3516 2512 2826da09d12953f75a1b13444a03dfe9.exe 91 PID 2512 wrote to memory of 3516 2512 2826da09d12953f75a1b13444a03dfe9.exe 91 PID 3516 wrote to memory of 232 3516 2826da09dRKJQ.exe 99 PID 3516 wrote to memory of 232 3516 2826da09dRKJQ.exe 99 PID 3516 wrote to memory of 232 3516 2826da09dRKJQ.exe 99 PID 232 wrote to memory of 208 232 cmd.exe 98 PID 232 wrote to memory of 208 232 cmd.exe 98 PID 232 wrote to memory of 208 232 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2826da09d12953f75a1b13444a03dfe9.exe"C:\Users\Admin\AppData\Local\Temp\2826da09d12953f75a1b13444a03dfe9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\2826da09dRKJQ.exe-yue2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:232
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns1⤵
- Gathers network information
PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5c9d27d5f4e33403af02afc0c21b6bb59
SHA18e0037406360ac8764edf513f7982d99a990e76a
SHA256c4398e314844ac51f264857ac0465537a11061fd26718a1bb6de46565893c649
SHA512bfdbdbfa7808c563a5ef2e69df33e7ef58b6daf0c0bd7bdd1dbfb9aced2f7ca057f32c31c839fac165593e36d14bd8d29863d77bf5b6b6dffa50df48293a6a97
-
Filesize
107KB
MD5a9f52619afbe50b535feb980bf79a65a
SHA1b46fbe156cdcc4ae2b455859920f0e0fb819556d
SHA2563b4b406c9385321edb78f9d06f60b107d81ea31545a63b0e13592030e014342c
SHA5124d6bd5cd7a2fe000906f19a8fbf979bf987a7b92e546e8eda3e588a0b2f1aa2631c34c05ea84e67ede5a65392cf3fea7df3999c597b683402e9ea05885297110
-
Filesize
105KB
MD52682f0cb9e3013e22a99b2215067ab82
SHA1a1eb3e02b6d05f910e4e4e9699abca859d01ed50
SHA256774d43d429f7491103e1a321e2f5fd1e1d9462a3cf1f27acddabae472a360cb1
SHA512d09cb0948cf7e5f345870bb076347746ee9f4db173630a0f954fb3a2a5993d99cbb1d2f0bcaff64b21c2d9dd4471581715500b47198435ce3448732f406974f5