Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:12

General

  • Target

    fbe27ad7251d741049e461c5cd248961.exe

  • Size

    208KB

  • MD5

    fbe27ad7251d741049e461c5cd248961

  • SHA1

    0ccc82eab7d1494150c7d933431c5234f37aa09d

  • SHA256

    3acd37405fd412651f315fed6d1df265f0c606c81f299fbff3a72710e37cab9d

  • SHA512

    523487aa22161c443777a28c6f7fa3511aa470d75c7a1f321b4f5120e27857d3b506d52fd5aa38403303492cf664eb117ce3635275b98d6298e1a7398213b8e6

  • SSDEEP

    6144:TlGRgXm15iDjfqssrSVR6AFVmpP7lnn1y:8v1SqixFsJlnn1y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe
    "C:\Users\Admin\AppData\Local\Temp\fbe27ad7251d741049e461c5cd248961.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\465F.tmp\vir.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\calc.exe
        CALC.EXE
        3⤵
        • Modifies registry class
        PID:4784
      • C:\Users\Admin\AppData\Local\Temp\u.dll
        u.dll -bat vir.bat -save fbe27ad7251d741049e461c5cd248961.exe.com -include s.dll -overwrite -nodelete
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4844
  • C:\Users\Admin\AppData\Local\Temp\46DC.tmp\mpress.exe
    "C:\Users\Admin\AppData\Local\Temp\46DC.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe46DD.tmp"
    1⤵
    • Executes dropped EXE
    PID:3808
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\465F.tmp\vir.bat

          Filesize

          1KB

          MD5

          80c68fbc8cf69c5887423b76dfdbf821

          SHA1

          4bb5d634c4db876cdd7117e8ed33a885ca5621e1

          SHA256

          f227b981e47fd6ad79a07350f5cde808697eee8c57b6f8e1ce3c26a93c068ee2

          SHA512

          c9fa9b499cdad8e1933ff10eca448c6ba5e8839212449ea8fbeba54d576ad2be403f7dad0632342c88735f0931d539a05a37f7019a86bb14ac2703c4574873ed

        • C:\Users\Admin\AppData\Local\Temp\46DC.tmp\mpress.exe

          Filesize

          100KB

          MD5

          e42b81b9636152c78ba480c1c47d3c7f

          SHA1

          66a2fca3925428ee91ad9df5b76b90b34d28e0f8

          SHA256

          7c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2

          SHA512

          4b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e

        • C:\Users\Admin\AppData\Local\Temp\exe46DD.tmp

          Filesize

          41KB

          MD5

          4d1c4e637e66e3aee050194ee149b1ae

          SHA1

          542aab9bf825e8cbb8afc946b8fe555ea402a413

          SHA256

          ba3591ba0a42bd2556af093af3beb685383b239570a459d00ad9ff0747851e25

          SHA512

          801010a3a79285d26a7ecd84928b7e24de7adab6ad67d2d2ebc81a5639a6b9ea9f0f5cb087e1dfbda5a9cfa031bc2f1798f18d688a7cfc600cb9cde670862011

        • C:\Users\Admin\AppData\Local\Temp\exe46DD.tmp

          Filesize

          24KB

          MD5

          eea12ffa949b5ad5f71e4a086a674c35

          SHA1

          c2a96e443b72a2869f2e9425aa775680f4cb2d72

          SHA256

          b984ba079f06f412c63ad35289400e640e26c8df67ee58975d8822a55cf24341

          SHA512

          6e078d975011f04ceee3f95ffaf3b13d00532b869d4305a153efa6d4c7bf8413cf7d353e1f0edf07bd982a72e9a5740c6e7bd0250c532cb7eb24a49e6fc02c9a

        • C:\Users\Admin\AppData\Local\Temp\s.dll

          Filesize

          700KB

          MD5

          e52e1dacca253a95205caebdf9ba61be

          SHA1

          89b934078b0ebb6045bcc17eee3395fc3af688ca

          SHA256

          bc6123009aa8bb34968892ccdd73ef4470aea0651056a9c81e10c60185b81621

          SHA512

          98cc05f9a24eb88d6c3be905c7870db5bc4d2b36c7a62abde8b2a4e3f2066bd715173c5b17d7066b8db049d6adba0a0b7a2214d3eb54a89ce5e1e97f6afcd4c0

        • C:\Users\Admin\AppData\Local\Temp\u.dll

          Filesize

          93KB

          MD5

          ec3db92301aa424c7a530a4d539a7f37

          SHA1

          ce848672ac400bb50fb7ef6dfbb0f92f3b41d65c

          SHA256

          6a9bad795d66771f71f44ef3200af4939ff91cbf757aece23ef677e08b63eebc

          SHA512

          a6cbd9adaa09737eccce6876531aa59b43b945bcf0ec2b97645f98377061eec725bb7bc678bc7ec16cbf2ba1dcac118a382c0746846cfffde0fdc349331b6b91

        • C:\Users\Admin\AppData\Local\Temp\vir.bat

          Filesize

          1KB

          MD5

          6cbca4829bb07836da4cfb00d0bcd3e1

          SHA1

          0fd4158ce8b42ae5a4f46b00d83a186c9fafd3c1

          SHA256

          e349073597d81ea36c97382be0f901004daef692caa2ed26bc0d187740ca91db

          SHA512

          38726f31513570ef51a822f43a72bf94ce7956221520c629b7906d93a541dd0f5e8906837a634fcba6bd26243dce11677b1704fdeaa3b1f44757dc586892971f

        • memory/3408-0-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3408-1-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3408-71-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/3808-57-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB

        • memory/3808-63-0x0000000000400000-0x0000000000434000-memory.dmp

          Filesize

          208KB