Analysis
-
max time kernel
1s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
531f330dd3e3a33973c6a0cf487ace41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
531f330dd3e3a33973c6a0cf487ace41.exe
Resource
win10v2004-20231215-en
General
-
Target
531f330dd3e3a33973c6a0cf487ace41.exe
-
Size
209KB
-
MD5
531f330dd3e3a33973c6a0cf487ace41
-
SHA1
66620800b40436ba6fbc80e2dfa3943570c1d443
-
SHA256
167ee6cffd99c43a52c901bc84d844754f787ebf0a2d6b74ffad5546be40c08d
-
SHA512
d844bcefeb487afd865113572f9803125ea77fb5d1df2013e84d322e0955171647b90bf20febc4b845fab1575e023e0a66f8217d8a7192f3ffe9538a41b16025
-
SSDEEP
6144:slkXVq0hy7Wwdk+fK1DiLuS5Zk7Sb6WiMzM5L:vXVyWwdkb1Q5Sp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2108 u.dll 4136 mpress.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3428 4556 531f330dd3e3a33973c6a0cf487ace41.exe 98 PID 4556 wrote to memory of 3428 4556 531f330dd3e3a33973c6a0cf487ace41.exe 98 PID 4556 wrote to memory of 3428 4556 531f330dd3e3a33973c6a0cf487ace41.exe 98 PID 3428 wrote to memory of 2108 3428 cmd.exe 89 PID 3428 wrote to memory of 2108 3428 cmd.exe 89 PID 3428 wrote to memory of 2108 3428 cmd.exe 89 PID 2108 wrote to memory of 4136 2108 u.dll 92 PID 2108 wrote to memory of 4136 2108 u.dll 92 PID 2108 wrote to memory of 4136 2108 u.dll 92 PID 3428 wrote to memory of 2828 3428 cmd.exe 93 PID 3428 wrote to memory of 2828 3428 cmd.exe 93 PID 3428 wrote to memory of 2828 3428 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\531f330dd3e3a33973c6a0cf487ace41.exe"C:\Users\Admin\AppData\Local\Temp\531f330dd3e3a33973c6a0cf487ace41.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4A19.tmp\vir.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 531f330dd3e3a33973c6a0cf487ace41.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\4A76.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\4A76.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe4A77.tmp"2⤵
- Executes dropped EXE
PID:4136
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE1⤵PID:2828
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:2872
-
C:\Windows\SysWOW64\calc.exeCALC.EXE1⤵PID:5072
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:1488
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bcb4b17993b756d7ffb560fba831c104
SHA1f669b552e3c4a4569054dc59be1669325e1a68ce
SHA2566cb2588af3406f3adf7398c209b606a6eb796b68459f61ee1efa558017bc7223
SHA5127d20766a94d353c588283a537e88ec99810ec67d9e3fb24d7c288e8c0c979f0318223bb16dc46ddcccf401cdc371e5ab786ceae0ef189073fddc4f1a00d95532
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
41KB
MD5863c72510f3c30b4e2cd208090af8b92
SHA13c5a6732c904ba8c3004e257d5008beb5311b7af
SHA25687454715574db5716ae855a6dd5a09f80a0ce0adba4699b485dc3152dc3ce544
SHA512d7356b3561c3a8e84cc004d3852e3f8562023e4819e9e07e52b3fbdbb5645c64f9a436bcaea55b24e0fdd231b16d0941ad027db9870230db38a0ca81985d452b
-
Filesize
24KB
MD5f680e9ae05faa8f515979455a15d34a8
SHA1474bcbb3309059e5950ec06a370d42e290eefda8
SHA256def67e83cf64e184ac206e4c7445ecf4151932bd2d05adb0623c014d94565093
SHA512b9b403b2890005628fb1a1a90a5fb96d164bfe7605f180063000161fe7a2b8065589ba9934cb07233a84d169987c14b541deef3e7f896929e70a5724233eb413
-
Filesize
700KB
MD5e4127ceb5db948172fd241be25b36358
SHA15a01fa3772c6d27630d50c73fadac9508780c51a
SHA256f3e8cd29180b07115d0d33a3ecf0c542da05680aee99971aa7e9bd2423597f70
SHA51213dd5db60d2faeaee632b62a3c92b323215931250ed8a1513a0af9b92c335dbf4b6c458e266bc08431eccff36256203dc81488e6f83185bdee737eed1a82883d
-
Filesize
1KB
MD55f5b0dc8d3fedfb355c2edae79f82796
SHA18055d1591519c7577b030060e6d6870109f8904e
SHA2567acb74ea0bdde03b1f78ba14ef403d5f90ce2a4aafd642366c3ceed834a1b5e7
SHA512b631c1f8f61c55a2889701a2a33e72c6ffc07b415be2b9a3a8d520dad8f1691bf9ebfebc2a0f582c52859853e6fb853c5e11bde7dfdea03eb9843682fbbd78e3