Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
05b52e140a2ad13e0941f917b537dff3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05b52e140a2ad13e0941f917b537dff3.exe
Resource
win10v2004-20231222-en
General
-
Target
05b52e140a2ad13e0941f917b537dff3.exe
-
Size
209KB
-
MD5
05b52e140a2ad13e0941f917b537dff3
-
SHA1
c96936d0521cc248d6a65ca05c79e36444e58545
-
SHA256
e9538d759a3eb323bd74736c5a3f002f371048e131a4fbfc5fb91ecd29438ed7
-
SHA512
53cffbfc2bf9e50ade58d005f618308808d1493220b1523228c707047c38b53e51db41f468a3318fb065badf0c581065195bfa74d70e2957af8af24f8ecd2914
-
SSDEEP
6144:vlKiQ9xysISXcE645G4hKf1lMa98TB1rOl4K4ikOd:wbryREn5768rO+ik
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2792 u.dll 2852 u.dll 2876 mpress.exe -
Loads dropped DLL 6 IoCs
pid Process 2208 cmd.exe 2208 cmd.exe 2208 cmd.exe 2208 cmd.exe 2852 u.dll 2852 u.dll -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2208 2500 05b52e140a2ad13e0941f917b537dff3.exe 15 PID 2500 wrote to memory of 2208 2500 05b52e140a2ad13e0941f917b537dff3.exe 15 PID 2500 wrote to memory of 2208 2500 05b52e140a2ad13e0941f917b537dff3.exe 15 PID 2500 wrote to memory of 2208 2500 05b52e140a2ad13e0941f917b537dff3.exe 15 PID 2208 wrote to memory of 2792 2208 cmd.exe 14 PID 2208 wrote to memory of 2792 2208 cmd.exe 14 PID 2208 wrote to memory of 2792 2208 cmd.exe 14 PID 2208 wrote to memory of 2792 2208 cmd.exe 14 PID 2208 wrote to memory of 2852 2208 cmd.exe 31 PID 2208 wrote to memory of 2852 2208 cmd.exe 31 PID 2208 wrote to memory of 2852 2208 cmd.exe 31 PID 2208 wrote to memory of 2852 2208 cmd.exe 31 PID 2852 wrote to memory of 2876 2852 u.dll 33 PID 2852 wrote to memory of 2876 2852 u.dll 33 PID 2852 wrote to memory of 2876 2852 u.dll 33 PID 2852 wrote to memory of 2876 2852 u.dll 33 PID 2208 wrote to memory of 292 2208 cmd.exe 32 PID 2208 wrote to memory of 292 2208 cmd.exe 32 PID 2208 wrote to memory of 292 2208 cmd.exe 32 PID 2208 wrote to memory of 292 2208 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 05b52e140a2ad13e0941f917b537dff3.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ADA.tmp\vir.bat""1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\26F1.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\26F1.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exe26F2.tmp"3⤵
- Executes dropped EXE
PID:2876
-
-
-
C:\Windows\SysWOW64\calc.exeCALC.EXE2⤵PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\05b52e140a2ad13e0941f917b537dff3.exe"C:\Users\Admin\AppData\Local\Temp\05b52e140a2ad13e0941f917b537dff3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5e42b81b9636152c78ba480c1c47d3c7f
SHA166a2fca3925428ee91ad9df5b76b90b34d28e0f8
SHA2567c24c72439880e502be51da5d991b9b56a1af242b4eef4737f0f43b4a87546d2
SHA5124b2986106325c5c3fe11ab460f646d4740eb85252aa191f2b84e29901fac146d7a82e31c72d39c38a70277f78278621ee506d9da2681f5019cd64c7df85cff6e
-
Filesize
2KB
MD578ce3a04668b238b2f7fd442154204e7
SHA1ce9ce456e68bd006521ec2764cb044c30021db08
SHA2562535b506ad1eaba13ffe2bfffa3d84e2f063fb624db7f296341583350c553aaf
SHA512210e6db0443f0a22c5c703aae0bf9ecf40473546fed8b2c9b4cbe0d84cc361fc8f0945c82c40bc77d3db53f95f40240dd0b3d72f81e05ab34b9efaf817dac047
-
Filesize
24KB
MD593cb0adb901680dd14269ab60f8e59c1
SHA136d8f6831c115cc28c096947ab078da884a71b8b
SHA25612df3126aee7ef26b97e1e8cf0b98f0a3c7450d86214a3c55752444ead3425e1
SHA5121b2cc2c348ea28b998e3ed6f41efe95a3cfbf8ce22d8132cc1a0aafdf08fb2890efad278655770f9eb8cc3e69377d34db9de6733f21e00da2b4c4236fe702453
-
Filesize
41KB
MD534dc2281ba5f8c4a7db8388be126278d
SHA11974c9398171a8151acc6602a5f0adea3c62ad98
SHA256b40e0b0ed0a877a445c21852b0449a4a45fb1210babc9b5ff0c024f29cafa4b6
SHA5125b0b0a694464d1d20786f726c32b571e757db323c0d9523c3028f4ec9702023501749b908c86dc19b3f8f0e1d514413868e148ceb39c6ce9544d70bc3ee5b8da
-
Filesize
382KB
MD53981395ac550547f964f87a3f15e2158
SHA17538d14a77bbb4cdfadff74385f849199392bf74
SHA2568ef383ea0d049c6972c81e1ecdde8d719d5d0cdda995fa1ab70a3ee32c4acb73
SHA512700649f2d7180ce60457de5537544254c40fba9b8871312cf0f25743fcce46714b21c3cc079e80afbc342edd743e33e91b4e28e412315bcdfc8436170e37f1f7
-
Filesize
3KB
MD57c2a7d515388a6462b78da46221739a5
SHA1e5b22e93559a785624f2737b9ce56dd33456fbdd
SHA2561a7b433313b2318cc9e0806bce779b74b64d74db45315cc2ba1105db9a1e5898
SHA5122116e9729d13e80e8b8a43cedd38d059033f23cbc82c9c3634b3b8cafa034f9be849c22fcf11da65002a3f79d9466f0c2ef7b7e9e9ab62140a0151ef1e49e640
-
Filesize
2KB
MD549e2ce938c602478562780db1903fad3
SHA1f67a09e58cecc247364df747becdbf6bfac6a4f7
SHA256f4a4346e0294e6a07f5f44b10b2333e35fa0323e49a260b5ec46520259eca2b8
SHA5128b6de308999b94661fe37cc9fcb7476d5083cad479809205f68dbe515ed835900f99c4c7bc8375b835af0a7389ad1329c9dc4c354a11fed7f67ee98280f989d9
-
Filesize
700KB
MD553ee8e1c37a92d5aeb8659ecee2ac3a1
SHA171796b59fbdf11911e334bd75c4db768ccb2e20c
SHA256bc1d49335ec67901098d7ad58da0d48b7900132807dc6eb28d4dbbc794bcc0c0
SHA51224d8ab3d149396a85f08f98c64610e3b536ddd5abe4f83aa77597dd3c657cee3ee725f40d78c33b16eed0853654edf5803e83b9b61c99253f1d3d214cc122231