Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
0648b2f429cce371960607c58ec79bc3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0648b2f429cce371960607c58ec79bc3.exe
Resource
win10v2004-20231222-en
General
-
Target
0648b2f429cce371960607c58ec79bc3.exe
-
Size
60KB
-
MD5
0648b2f429cce371960607c58ec79bc3
-
SHA1
f03bb6d6d2a66c5b974986367c60273d6154d79c
-
SHA256
72749183b4c3f0cfebd2daef0b465a2cf510167974fb2adfe29ac20c44787875
-
SHA512
12ebf80ddcb9c2471639f609cb5cc23687a9b006b18e1c817d474c2449fe253487bac768f46ce296ee4769381e779142130d6c0d3f0b4a3bbb334a877cf20eb6
-
SSDEEP
1536:v0hmutXxGhXOQlktnm54p/7TDTRJAn8X0UccVegKv9:v0hTyhXdqtnbD3TNk52pKv9
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ojkzepmx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GFZIyyGyak = "C:\\ProgramData\\kdanohsd\\ojkzepmx.exe" ojkzepmx.exe -
Executes dropped EXE 1 IoCs
pid Process 3392 ojkzepmx.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2980 0648b2f429cce371960607c58ec79bc3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3392 2980 0648b2f429cce371960607c58ec79bc3.exe 107 PID 2980 wrote to memory of 3392 2980 0648b2f429cce371960607c58ec79bc3.exe 107 PID 2980 wrote to memory of 3392 2980 0648b2f429cce371960607c58ec79bc3.exe 107 PID 2980 wrote to memory of 3468 2980 0648b2f429cce371960607c58ec79bc3.exe 106 PID 2980 wrote to memory of 3468 2980 0648b2f429cce371960607c58ec79bc3.exe 106 PID 2980 wrote to memory of 3468 2980 0648b2f429cce371960607c58ec79bc3.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0648b2f429cce371960607c58ec79bc3.exe"C:\Users\Admin\AppData\Local\Temp\0648b2f429cce371960607c58ec79bc3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\0648B2~1.EXE.bak >> NUL2⤵PID:3468
-
-
C:\ProgramData\kdanohsd\ojkzepmx.exeC:\ProgramData\kdanohsd\ojkzepmx.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD50648b2f429cce371960607c58ec79bc3
SHA1f03bb6d6d2a66c5b974986367c60273d6154d79c
SHA25672749183b4c3f0cfebd2daef0b465a2cf510167974fb2adfe29ac20c44787875
SHA51212ebf80ddcb9c2471639f609cb5cc23687a9b006b18e1c817d474c2449fe253487bac768f46ce296ee4769381e779142130d6c0d3f0b4a3bbb334a877cf20eb6