Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
06cbe9d375a169348eb8228323842a00.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06cbe9d375a169348eb8228323842a00.exe
Resource
win10v2004-20231215-en
General
-
Target
06cbe9d375a169348eb8228323842a00.exe
-
Size
48KB
-
MD5
06cbe9d375a169348eb8228323842a00
-
SHA1
28c9bc11cf3f6de4c20af3cabda0af27a975105e
-
SHA256
a0c8a4ec7e8a1ed9fab2e5819e9734bb8a71c72b247c57886e41b53570a5a005
-
SHA512
ce5666569e08a522e897c1a8da9afb8e590dcba03808cfbe77dc3f5802ba4e067ac1276dc83d60b764047c6eeb2b239454ea836d170636f11ed22169b8d2f3fe
-
SSDEEP
768:h49KNNgZT12N/JFdCmPSX1hunMuwXat5BxLBH82:h4oXy12lEmiuMuJTVh82
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3408 lenschk.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\lenschk.exe 06cbe9d375a169348eb8228323842a00.exe File opened for modification C:\Windows\SysWOW64\lenschk.exe 06cbe9d375a169348eb8228323842a00.exe File created C:\Windows\SysWOW64\lensch.dll 06cbe9d375a169348eb8228323842a00.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1864 wrote to memory of 3408 1864 06cbe9d375a169348eb8228323842a00.exe 31 PID 1864 wrote to memory of 3408 1864 06cbe9d375a169348eb8228323842a00.exe 31 PID 1864 wrote to memory of 3408 1864 06cbe9d375a169348eb8228323842a00.exe 31 PID 1864 wrote to memory of 3416 1864 06cbe9d375a169348eb8228323842a00.exe 96 PID 1864 wrote to memory of 3416 1864 06cbe9d375a169348eb8228323842a00.exe 96 PID 1864 wrote to memory of 3416 1864 06cbe9d375a169348eb8228323842a00.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cbe9d375a169348eb8228323842a00.exe"C:\Users\Admin\AppData\Local\Temp\06cbe9d375a169348eb8228323842a00.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\lenschk.exeC:\Windows\system32\lenschk.exe ˜‰2⤵
- Executes dropped EXE
PID:3408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\06cbe9d375a169348eb8228323842a00.exe.bat2⤵PID:3416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5a6c670fab04d9173a8d1de4693b547d2
SHA1bf136eb4ee9e3ade9da06e29dd3d1d7afd8302d7
SHA256b35466eb656c17aa4f6104b242f57a2755cb65faa9e180511193ca39556ac703
SHA5123c17bed73bca2cbacad3ac3463cfc6915a7bc50f8d13c64d3014ebed70ab7e3efde423c15c3ad1db232fe5a24b6617a6eb7e811bde795643a7fe0a89ac932ea6
-
Filesize
1KB
MD528aa68cc816faa7a0bc9ffb552472a60
SHA16a24f3be52fbe221c6607ca8b33de7b58895a2a7
SHA256e5876f1861235e660fa534e7a97721823a9c29e98e2b62cc3cfa8610c6a6f964
SHA512a18fc821b624fb92b85577000ba8d75cd325550e169d40247cadb279d6484e6eec1e96941fa2a78f18535e31d907fb236bf43b8a424ad6626452ae2e58350675