Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 22:12
Static task
static1
Behavioral task
behavioral1
Sample
fbe27ad7251d741049e461c5cd248961.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fbe27ad7251d741049e461c5cd248961.exe
Resource
win10v2004-20231215-en
General
-
Target
fbe27ad7251d741049e461c5cd248961.exe
-
Size
208KB
-
MD5
fbe27ad7251d741049e461c5cd248961
-
SHA1
0ccc82eab7d1494150c7d933431c5234f37aa09d
-
SHA256
3acd37405fd412651f315fed6d1df265f0c606c81f299fbff3a72710e37cab9d
-
SHA512
523487aa22161c443777a28c6f7fa3511aa470d75c7a1f321b4f5120e27857d3b506d52fd5aa38403303492cf664eb117ce3635275b98d6298e1a7398213b8e6
-
SSDEEP
6144:TlGRgXm15iDjfqssrSVR6AFVmpP7lnn1y:8v1SqixFsJlnn1y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2440 u.dll 2824 u.dll 2548 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2920 cmd.exe 2920 cmd.exe 2920 cmd.exe 2920 cmd.exe 2824 u.dll 2824 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2920 2172 fbe27ad7251d741049e461c5cd248961.exe 29 PID 2172 wrote to memory of 2920 2172 fbe27ad7251d741049e461c5cd248961.exe 29 PID 2172 wrote to memory of 2920 2172 fbe27ad7251d741049e461c5cd248961.exe 29 PID 2172 wrote to memory of 2920 2172 fbe27ad7251d741049e461c5cd248961.exe 29 PID 2920 wrote to memory of 2440 2920 cmd.exe 30 PID 2920 wrote to memory of 2440 2920 cmd.exe 30 PID 2920 wrote to memory of 2440 2920 cmd.exe 30 PID 2920 wrote to memory of 2440 2920 cmd.exe 30 PID 2920 wrote to memory of 2824 2920 cmd.exe 31 PID 2920 wrote to memory of 2824 2920 cmd.exe 31 PID 2920 wrote to memory of 2824 2920 cmd.exe 31 PID 2920 wrote to memory of 2824 2920 cmd.exe 31 PID 2824 wrote to memory of 2548 2824 u.dll 32 PID 2824 wrote to memory of 2548 2824 u.dll 32 PID 2824 wrote to memory of 2548 2824 u.dll 32 PID 2824 wrote to memory of 2548 2824 u.dll 32 PID 2920 wrote to memory of 1984 2920 cmd.exe 33 PID 2920 wrote to memory of 1984 2920 cmd.exe 33 PID 2920 wrote to memory of 1984 2920 cmd.exe 33 PID 2920 wrote to memory of 1984 2920 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\C6F.tmp\vir.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save fbe27ad7251d741049e461c5cd248961.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\2839.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\2839.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe283A.tmp"4⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE3⤵PID:1984
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
1KB
MD580c68fbc8cf69c5887423b76dfdbf821
SHA14bb5d634c4db876cdd7117e8ed33a885ca5621e1
SHA256f227b981e47fd6ad79a07350f5cde808697eee8c57b6f8e1ce3c26a93c068ee2
SHA512c9fa9b499cdad8e1933ff10eca448c6ba5e8839212449ea8fbeba54d576ad2be403f7dad0632342c88735f0931d539a05a37f7019a86bb14ac2703c4574873ed
-
Filesize
41KB
MD54d1c4e637e66e3aee050194ee149b1ae
SHA1542aab9bf825e8cbb8afc946b8fe555ea402a413
SHA256ba3591ba0a42bd2556af093af3beb685383b239570a459d00ad9ff0747851e25
SHA512801010a3a79285d26a7ecd84928b7e24de7adab6ad67d2d2ebc81a5639a6b9ea9f0f5cb087e1dfbda5a9cfa031bc2f1798f18d688a7cfc600cb9cde670862011
-
Filesize
25KB
MD5d19ab94a86e4c992930d7f585339e982
SHA1aaa1aff3c3df7d9c34953572a907fd72353f66b9
SHA256c719871d8ed6ea83bcac40347bd01e141f79a05f67893027fa96d3c874662c1f
SHA512a859740f28a70bd2ec4ddd551571cfcc2f5f59db9236b9a716b0f236502b794d2e0c8e9e5bb592769147bf08117ae1759ec19f4deaef9a42a6635530bc89edc1
-
Filesize
41KB
MD51bac1e68caa8b23d9184cccea5a53ea0
SHA1fb5975bd115ce664edb0dbffc40b31658db27ecb
SHA2560cc9c7bc2b253b169ea4d05eed4b83ec4eb9cd5b7c7cdcdd24b3d0807e818c53
SHA51240cbdef12fe81b6328a080b6f2d92bb65f02062783449bbd0c9646da1b304465c2243835d93c6add8832d1572d4ae69dac4773fa6b29b9af7cacccaebeb08288
-
Filesize
700KB
MD5e52e1dacca253a95205caebdf9ba61be
SHA189b934078b0ebb6045bcc17eee3395fc3af688ca
SHA256bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621
SHA51298cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0
-
Filesize
1KB
MD56cbca4829bb07836da4cfb00d0bcd3e1
SHA10fd4158ce8b42ae5a4f46b00d83a186c9fafd3c1
SHA256e349073597d81ea36c97382be0f901004daef692caa2ed26bc0d187740ca91db
SHA51238726f31513570ef51a822f43a72bf94ce7956221520c629b7906d93a541dd0f5e8906837a634fcba6bd26243dce11677b1704fdeaa3b1f44757dc586892971f
-
Filesize
1KB
MD59c956e30a6906c5a371c9d5b2aeb48b0
SHA1e055e78ef2667983b1c4e28c47586a1487fa2284
SHA2569f0f7a8a74ec8160b0649b8450a4aa327ef120c91a09c871e376b8ed4bef5d4c
SHA51205fbf040dc0ee64058e75299f1bb8b1144a63e8515cc4aebb1799c20ab1b29399342880742dbd8127ea25b24e97223388ba9b8217af04de8c7698bb24fbb615c