Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
7cc1b53a16f78080dbc622b80ad5a814.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7cc1b53a16f78080dbc622b80ad5a814.exe
Resource
win10v2004-20231215-en
General
-
Target
7cc1b53a16f78080dbc622b80ad5a814.exe
-
Size
209KB
-
MD5
7cc1b53a16f78080dbc622b80ad5a814
-
SHA1
c47ba1aedaca8f4bfb2864ea9fcba321a0d67bc5
-
SHA256
a1c0c1bca1f56567797177345c32e0aeebf119c6795535364b19abd0c2908d28
-
SHA512
a9078e7ba0e60d97372f0015bd12119791b27036d0a5a7bfc746e918c4f708f67f9f6032150411f14f6ca49b3bd8be6d4a5666b529ca724c4fd984dd20b8096c
-
SSDEEP
3072:nldVutUYVsmgqisE8R7BD1pKuwlutkNhFnOWc71W64SvNIambRi2sf:nldVuZJisPxpRsP1chbIam1i22
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2740 u.dll 2748 u.dll 1900 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2816 cmd.exe 2816 cmd.exe 2816 cmd.exe 2816 cmd.exe 2748 u.dll 2748 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2816 2184 7cc1b53a16f78080dbc622b80ad5a814.exe 29 PID 2184 wrote to memory of 2816 2184 7cc1b53a16f78080dbc622b80ad5a814.exe 29 PID 2184 wrote to memory of 2816 2184 7cc1b53a16f78080dbc622b80ad5a814.exe 29 PID 2184 wrote to memory of 2816 2184 7cc1b53a16f78080dbc622b80ad5a814.exe 29 PID 2816 wrote to memory of 2740 2816 cmd.exe 30 PID 2816 wrote to memory of 2740 2816 cmd.exe 30 PID 2816 wrote to memory of 2740 2816 cmd.exe 30 PID 2816 wrote to memory of 2740 2816 cmd.exe 30 PID 2816 wrote to memory of 2748 2816 cmd.exe 31 PID 2816 wrote to memory of 2748 2816 cmd.exe 31 PID 2816 wrote to memory of 2748 2816 cmd.exe 31 PID 2816 wrote to memory of 2748 2816 cmd.exe 31 PID 2748 wrote to memory of 1900 2748 u.dll 32 PID 2748 wrote to memory of 1900 2748 u.dll 32 PID 2748 wrote to memory of 1900 2748 u.dll 32 PID 2748 wrote to memory of 1900 2748 u.dll 32 PID 2816 wrote to memory of 3052 2816 cmd.exe 33 PID 2816 wrote to memory of 3052 2816 cmd.exe 33 PID 2816 wrote to memory of 3052 2816 cmd.exe 33 PID 2816 wrote to memory of 3052 2816 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cc1b53a16f78080dbc622b80ad5a814.exe"C:\Users\Admin\AppData\Local\Temp\7cc1b53a16f78080dbc622b80ad5a814.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6D73.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 7cc1b53a16f78080dbc622b80ad5a814.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\87D5.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\87D5.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe87E6.tmp"4⤵
- Executes dropped EXE
PID:1900
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:3052
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb59c003810181c53a41db6ebb09a0ad
SHA1089a11ad474080dc37de4f0d3b06bc51a7ddab5f
SHA25679f424285f16d0dfbbc0c2db1f5e729f362acfb6ff04679cee140f89e8abe2c0
SHA5124332ddf620cc6562512e8bdde755ac56966802a8c9c1bf7b776d49e1d3c66a96fe5af73e8c44acb137c218adf790508627242be4c16565fe7d993828fcf7527f
-
Filesize
41KB
MD52962dfcac22070e3da981e1115397938
SHA109a2ddd77cc9265c1c9a3a0b3797ea5007e3bd28
SHA256d47a5a1f144a7b1a0267ec604f18238419a29402b4ef51f1b2165f346ef88951
SHA5128efe28ee9ba694a2cc010bb61736de3f7bc190c3656f814a700e9992391a174982fa21f16d24ce1c36876e095f1a76569183cee52048ae22102cac621beb422a
-
Filesize
25KB
MD571a7a87a087b9c4439a66567699e7955
SHA1c576142751355178982213df42ea184f5cc17cbe
SHA256a14e2395b8aee936c01c67199afb45946c1264631812010549498e9921f08194
SHA51254f9d9784acbe05c476928f1dc2514dbb1032c8ba404d572ea85960f12fe3c0beb3ab62ce7c47b0c64df509070672c4a70f3e36168cef8458124402d8024ecf9
-
Filesize
41KB
MD5683584ad934560df98467d0c3a0e9b94
SHA12e1f3f885a8dfb8f67068a5f40000538b96b28a7
SHA25699df656183a4afe15c02a6c9ac1f23a8ed26c7733ba8476d32432d18f7f5c6fd
SHA512c1202a0fecb5eb7246c8f7b6909a41d234e67afa673d22f11d011059f05c08fdc5b069d3fea02960cec486e5f04eca5e58222f859d485a27d8f933f510acc285
-
Filesize
700KB
MD503e84bf7ea2eba6e881e868ceefe2526
SHA109019ed20cf16847a264f5d1840ee0802f1778a6
SHA2568b16836b18106d0e8fdbb4b26beefee04479fe219a59cc2a186b68db91fcd832
SHA51232a47a7b4725f2d71573ad855b0a3bc99b3fa86d70f7b1b60456361bbcd03d37ea58f2b7092c0b6993e156db4ddd66b1d544363523f580a6dd8c055697ec2026
-
Filesize
1KB
MD5e53e6d017028a88f71f30ed25a84297d
SHA13fb6014c8e6a87340ffd738ade80489809e6538b
SHA256b8482e93e4e04708d382aa9bf309d9824faee01c20a712bbdb75e4dce0ea5a93
SHA51272b3074d070016ceacd3127059ca9e6672475cbbdccef5bd4a15016c0633f4edb8204bd025effc24dad76a7ba064c688ef016c604c8c32676feaf5c77baa686b
-
Filesize
1KB
MD595f41e332e411d3acafb465926664001
SHA1de33555a7cfea9b5b190243293342cba5b34ef44
SHA256c3e2321fba1a85b64d635b60b13a56ac3dff427277106d9dc339143ee26048af
SHA5124b4ed72b9cb7a12ba59c7b33c1f134b25663e96795a0de40591879cf55400923f2515c1debf8312b3ecf72e600d7d731095ac6621fb94fe9ffe6a63592928dd7
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e