Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
6c698c33466610f384f78db9c138cab3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c698c33466610f384f78db9c138cab3.exe
Resource
win10v2004-20231215-en
General
-
Target
6c698c33466610f384f78db9c138cab3.exe
-
Size
208KB
-
MD5
6c698c33466610f384f78db9c138cab3
-
SHA1
64ade5d2e9f8536762df4f3859443d18f7796d39
-
SHA256
75b9d124f95f460989e41601c3a260e0bd45c4ec64f5fb620a4d9f33f7228d6d
-
SHA512
dbb7832babf8b3dd85f90e8a9cf0ea9e4cb2721d77429f522a583d81e370012450e3c57e60fa6def29f550053cbe72f0d3cff2e8d5031604dab7ba018ff3b491
-
SSDEEP
6144:3l0n6auFKBfjDLjiNxGwMp1ZdNDHYOgfwvQyXt:mn6auFK1jmNIwih1drH
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1548 u.dll 2740 u.dll 2120 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2264 cmd.exe 2264 cmd.exe 2264 cmd.exe 2264 cmd.exe 2740 u.dll 2740 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2264 2332 6c698c33466610f384f78db9c138cab3.exe 29 PID 2332 wrote to memory of 2264 2332 6c698c33466610f384f78db9c138cab3.exe 29 PID 2332 wrote to memory of 2264 2332 6c698c33466610f384f78db9c138cab3.exe 29 PID 2332 wrote to memory of 2264 2332 6c698c33466610f384f78db9c138cab3.exe 29 PID 2264 wrote to memory of 1548 2264 cmd.exe 30 PID 2264 wrote to memory of 1548 2264 cmd.exe 30 PID 2264 wrote to memory of 1548 2264 cmd.exe 30 PID 2264 wrote to memory of 1548 2264 cmd.exe 30 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2264 wrote to memory of 2740 2264 cmd.exe 31 PID 2740 wrote to memory of 2120 2740 u.dll 32 PID 2740 wrote to memory of 2120 2740 u.dll 32 PID 2740 wrote to memory of 2120 2740 u.dll 32 PID 2740 wrote to memory of 2120 2740 u.dll 32 PID 2264 wrote to memory of 2296 2264 cmd.exe 33 PID 2264 wrote to memory of 2296 2264 cmd.exe 33 PID 2264 wrote to memory of 2296 2264 cmd.exe 33 PID 2264 wrote to memory of 2296 2264 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c698c33466610f384f78db9c138cab3.exe"C:\Users\Admin\AppData\Local\Temp\6c698c33466610f384f78db9c138cab3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10A4.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 6c698c33466610f384f78db9c138cab3.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe2C8D.tmp"4⤵
- Executes dropped EXE
PID:2120
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:2296
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef0dbaac625b9d84d4314de766cb219b
SHA1c2b3d109fe2252b2d1711d254bfae2d8659e1ffb
SHA256078ac6b202f35549ed8155f0d2d5dfc037e8549fe5b1bf93cc04e8fe10215357
SHA512e94f7abf41e58182cbe24b9ada456b8a35999aac3d861bce70d63c093d64c9535a3dab0857aef24649b268b20ba265fdb872dfe0e60e1360875bca9d74042988
-
Filesize
25KB
MD5a7fb3de892773a55d1cb355013d339b4
SHA1587065ba85e85685686d183d753142239570b537
SHA25646768a61c8485cceff0b1ce8b9a4230fd7acda615c112b970592aa436f96f7f2
SHA5128e7b3271a38e914d98138f258cae731d92cf01ff47abf15494998d5e87f761bf9fe09a0681ecb4878942f6b589f202d10d223f831c333e70e6a6be9d1c4d681a
-
Filesize
41KB
MD5fc71d91a19a6c7dc29f3aea780627213
SHA12b0f5477e07d585ea8471ec87becdc83045d8ec0
SHA25660ad9ffd3f72533fdcc319dd7cf9213d38097f49f40d0f2001b373841fd00c33
SHA5123ce7c6abdd8e38ac9c2e0d257fbb0b8c34d17f446250ca1b1d79e1cf49fa3fb710183c7deaa9ba8ada24eeef7f07b39437761877126e98945bbb3b125cd56eb9
-
Filesize
41KB
MD57aa367dca7be65e07b16bd69f06263e3
SHA1d447739251408f8e8490a9d307927bfbe41737ce
SHA256738bf50547320b0683af727ad6d430f2e7b83c846fe24f91527b7ee263bfa076
SHA512d7884589d7d12a628c9e07b77b3b793fa91f67fe13563e7b072ca864e053e6b7d711852e30ae1c877576b8ad47f67d2826e8ee711e6b65a329baa57492fe31b3
-
Filesize
700KB
MD53c9568b0d86a865f9f73d9c0967cfdad
SHA13270df3e0e600f4df2c3cbc384837693a8a3a83e
SHA256c7b97a001b39e17382e929aad924555f3d21886b86aed38cffd660490801d1d6
SHA512bd423d1d57823b1bf6db42aeec199aa93178a9317ead85b42b60e091aaf4f73ce721bc07fda4750e112c4dccb9d87e21d5793965da9d6e92b0c5bed92c26876f
-
Filesize
1KB
MD514112e91e63b6e7e1dd66a1c59689ab0
SHA11edc63168113fd46847454c83f06f2b7abbc2264
SHA256208e3342beee170ba58954afb25f686ca28684267bce3f501a33760be6835f4f
SHA512e47747b526303d6d536d92e9c94b539c1b69f324820f77e6c3c56076aa7bf6502f3c9d3217c075c282167ba19d7872d464b78ce6f56d109a73e8b2364b4e820c
-
Filesize
1KB
MD5f7180c1fa6b5c6f947bc1e9cc4ad124f
SHA154b570f9f0f1f4d3cc930a67ec5ce202cadff17a
SHA2567d5c52de17a36cb103ff4954b805159cd3420259e5b27f2701b42fb3ba12d3af
SHA512c28fa5ccc2eef06d3d394b2ded821fa91400f0ec51c0f999cc78ab34986b94a5d9b52f68a4226fafde3a771c865436736f6222ba9095cac559f4986d91327745
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e