Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
KeepMoney.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KeepMoney.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
KeepMoney.exe
-
Size
1.1MB
-
MD5
89286330bc1ed7f52378ca1b0d343541
-
SHA1
c76fe70314478dcc5d54f093ea9b21b0aab2c2d2
-
SHA256
4f06b9a3c44898e61807dd026f3b0b948a80edca0b84fc4d9610ce32d6a61c04
-
SHA512
4fac4dbe6ec7b03d7089c8e95a25f24e4997d8e963f9dd6627a10506cd814325b3c429fac470dc6418ab8a45c39ae5076f29df817624edf19a9396f04a55468b
-
SSDEEP
24576:1fOy6WomBjReLdGq+8jhxG1BRUny3VnTOm4SIk9coyGZ2DLwWbu7Bkf1nC0l803/:1GpLmBsRO8+5Ey3VnTascdGZ2DLw4Omx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 is-MK6HQ.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1712 2896 KeepMoney.exe 88 PID 2896 wrote to memory of 1712 2896 KeepMoney.exe 88 PID 2896 wrote to memory of 1712 2896 KeepMoney.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\KeepMoney.exe"C:\Users\Admin\AppData\Local\Temp\KeepMoney.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\is-MNVM1.tmp\is-MK6HQ.tmp"C:\Users\Admin\AppData\Local\Temp\is-MNVM1.tmp\is-MK6HQ.tmp" /SL4 $90068 "C:\Users\Admin\AppData\Local\Temp\KeepMoney.exe" 885104 506882⤵
- Executes dropped EXE
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD5fa8621bfc44318a0e45e5a3414345318
SHA129de99e82aa87911d0761c95632ffec405164d93
SHA2566297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84
SHA512797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc