Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
5978a315e66b0a235ac8c084640c71c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5978a315e66b0a235ac8c084640c71c7.exe
Resource
win10v2004-20231215-en
General
-
Target
5978a315e66b0a235ac8c084640c71c7.exe
-
Size
40KB
-
MD5
5978a315e66b0a235ac8c084640c71c7
-
SHA1
0c4685abeb21e6ec10e3666897bd72dbdc13e927
-
SHA256
10760141f93337dbd96498776d0572093eb3f839a0c67c6ed2697312b215b4ca
-
SHA512
66f2fc9e8da52c1450b06ec0c4c7a9ecd8e557d1912400f8de3cabfcfea08f4a3e823d3c3d8a63922db5443f34aee66f3f7dd6e3f40ac41195c2f3df7e8fea62
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHI:aqk/Zdic/qjh8w19JDHI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3964 services.exe -
resource yara_rule behavioral2/files/0x000600000002323e-4.dat upx behavioral2/memory/3964-7-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-13-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-14-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-106-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-143-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/3964-163-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 5978a315e66b0a235ac8c084640c71c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 5978a315e66b0a235ac8c084640c71c7.exe File opened for modification C:\Windows\java.exe 5978a315e66b0a235ac8c084640c71c7.exe File created C:\Windows\java.exe 5978a315e66b0a235ac8c084640c71c7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 840 wrote to memory of 3964 840 5978a315e66b0a235ac8c084640c71c7.exe 92 PID 840 wrote to memory of 3964 840 5978a315e66b0a235ac8c084640c71c7.exe 92 PID 840 wrote to memory of 3964 840 5978a315e66b0a235ac8c084640c71c7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5978a315e66b0a235ac8c084640c71c7.exe"C:\Users\Admin\AppData\Local\Temp\5978a315e66b0a235ac8c084640c71c7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58ba61a16b71609a08bfa35bc213fce49
SHA18374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA2566aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA5125855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1
-
Filesize
313B
MD5ffb72ab4faba49ad441ce07db37dd8b6
SHA1194e13c1c32ebb6e7a1dc912261cbd58a82ff71e
SHA2567bd7c3676e98ddde8e0d5b63dd22cb9379d975bcd1d68884c97565cdd8d03660
SHA512517be20d2442489ce39b48dc7f9f6f13f8c45d02703fb1865071f553d36b2289f5abc26c6089fc0bfad1a41fe318bf4b5a806915c5e45898ac744b7e4ed30257
-
Filesize
312B
MD5c15952329e9cd008b41f979b6c76b9a2
SHA153c58cc742b5a0273df8d01ba2779a979c1ff967
SHA2565d065a88f9a1fb565c2d70e87148d469dd9dcbbefea4ccc8c181745eda748ab7
SHA5126aecdd949abcd2cb54e2fe3e1171ee47c247aa3980a0847b9934f506ef9b2d3180831adf6554c68b0621f9f9f3cd88767ef9487bc6e51cecd6a8857099a7b296
-
Filesize
40KB
MD59d967c50a3406a59ce994747f89fcfa5
SHA18e70f1891fdc7e04515618010c77d9f62867a02d
SHA25688b929646bccfefd4d525bdeacf851046fd052d7686d644b57788c392ca1d322
SHA5126053600b041d4c199e8b15a2ec793d0bab345dab11ed263b36ea6840259650dd16a278749da87194c29b5d152b67c09e90000f893ef73cefb462220f5e0303ab
-
Filesize
1KB
MD59b74e741b343decb6725fb7801c62431
SHA1f4efb8032dc12451ccbb9927ba0e95aff7f29c78
SHA2562e62376b0de885998623c12038f7d061aeefa50212c0aa90ea9aaccfbc98bb74
SHA512b3e902caeccabae00878bc4b4f0062ff7628714f86349710fd8e7d123553eaf21cb667b5e32fc7c583f66212a2f3379bbc8b50c2876891b04d1dd4dd7324660a
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2