Analysis
-
max time kernel
13s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:46
Behavioral task
behavioral1
Sample
6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe
Resource
win10v2004-20231215-en
General
-
Target
6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe
-
Size
134KB
-
MD5
6f8e1ac87ccc5b0c1f4ef34d513bb3e4
-
SHA1
5df5481ebef121f1650e03a4c97e8f576db16cb9
-
SHA256
e3e75e0e0a58ba276094b4953b13b34d1d996c748cad19aa8b0c49ccc8701568
-
SHA512
0522d4fcf5f854b5ea2e9e6a210326d2a9971f60f37f3f32ac18f685146f8a7a8c613423a46a9ed1380ee120c761244ecb23cae02881cdafd9f267b05069562c
-
SSDEEP
3072:A6Y86ICOgKZBEt3t04XaWxIBUFCneGFYYBuVTCFDQ:3Y86kgKs3t0PWWBCUeukCFE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4640 Dfyvoa.exe -
resource yara_rule behavioral2/memory/2692-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x000b000000023123-8.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dfyvoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Dfyvoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe File created C:\Windows\Dfyvoa.exe 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe File opened for modification C:\Windows\Dfyvoa.exe 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Main Dfyvoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe 4640 Dfyvoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4640 2692 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe 90 PID 2692 wrote to memory of 4640 2692 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe 90 PID 2692 wrote to memory of 4640 2692 6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe"C:\Users\Admin\AppData\Local\Temp\6f8e1ac87ccc5b0c1f4ef34d513bb3e4.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Dfyvoa.exeC:\Windows\Dfyvoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56f8e1ac87ccc5b0c1f4ef34d513bb3e4
SHA15df5481ebef121f1650e03a4c97e8f576db16cb9
SHA256e3e75e0e0a58ba276094b4953b13b34d1d996c748cad19aa8b0c49ccc8701568
SHA5120522d4fcf5f854b5ea2e9e6a210326d2a9971f60f37f3f32ac18f685146f8a7a8c613423a46a9ed1380ee120c761244ecb23cae02881cdafd9f267b05069562c
-
Filesize
362B
MD52c092560b95ff1a1d467838457a40005
SHA1f816118e6a597647024a530a0dfb41cca80b573f
SHA256239a6a644b08000610bbff3483940e618c4a4b499c9d93dd69ca221c19405262
SHA5126eff38f988dc3584838a23ccdea4fa1f1d93fb7cde200dcced72d4c0da409b241a9cb2eef595b51f03efb38ca64ffddaf1f9a11a5da53da54bbdfcde5c693b9c