Analysis
-
max time kernel
170s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:31
Behavioral task
behavioral1
Sample
1e8617c474f50fca963bb2927e57515b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e8617c474f50fca963bb2927e57515b.exe
Resource
win10v2004-20231215-en
General
-
Target
1e8617c474f50fca963bb2927e57515b.exe
-
Size
155KB
-
MD5
1e8617c474f50fca963bb2927e57515b
-
SHA1
c1056691820a1d343798d2a2b15a27ac8e7cd6eb
-
SHA256
392e0fb3d1a2f9fa9f0f495c7433508c103d1149061a8f18e2d3c05ab3fdd76d
-
SHA512
4f76236a5bf9bf33ab1d6c07d708a89f9d9ee330f817f838bc0619009bba4c851ae6f5c691ba9f0f205e5b46a5fa36241097f6099075c1d58e0cc81b6367b75c
-
SSDEEP
3072:H+bnHkQocN6sXuUowZIilfPZ8hFeDy4u47hvQJWVnwRSRvzdtDULTf:Ski1/ZbfwF1ChoJo3RxpU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3484 server.exe -
resource yara_rule behavioral2/memory/4032-0-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/files/0x0009000000023137-5.dat upx behavioral2/memory/4032-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3484-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral2/memory/3484-9-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\server.exe 1e8617c474f50fca963bb2927e57515b.exe File created C:\Windows\SysWOW64\server.exe 1e8617c474f50fca963bb2927e57515b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\appget.ini 1e8617c474f50fca963bb2927e57515b.exe File created C:\WINDOWS\appgets.ini server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4032 wrote to memory of 5032 4032 1e8617c474f50fca963bb2927e57515b.exe 92 PID 4032 wrote to memory of 5032 4032 1e8617c474f50fca963bb2927e57515b.exe 92 PID 4032 wrote to memory of 5032 4032 1e8617c474f50fca963bb2927e57515b.exe 92 PID 5032 wrote to memory of 3484 5032 cmd.exe 94 PID 5032 wrote to memory of 3484 5032 cmd.exe 94 PID 5032 wrote to memory of 3484 5032 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e8617c474f50fca963bb2927e57515b.exe"C:\Users\Admin\AppData\Local\Temp\1e8617c474f50fca963bb2927e57515b.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\WINDOWS\system32\server.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\WINDOWS\SysWOW64\server.exeC:\WINDOWS\system32\server.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155KB
MD51e8617c474f50fca963bb2927e57515b
SHA1c1056691820a1d343798d2a2b15a27ac8e7cd6eb
SHA256392e0fb3d1a2f9fa9f0f495c7433508c103d1149061a8f18e2d3c05ab3fdd76d
SHA5124f76236a5bf9bf33ab1d6c07d708a89f9d9ee330f817f838bc0619009bba4c851ae6f5c691ba9f0f205e5b46a5fa36241097f6099075c1d58e0cc81b6367b75c