Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:20
Behavioral task
behavioral1
Sample
0857f2c8541dba287d648eec17163d3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0857f2c8541dba287d648eec17163d3f.exe
Resource
win10v2004-20231215-en
General
-
Target
0857f2c8541dba287d648eec17163d3f.exe
-
Size
289KB
-
MD5
0857f2c8541dba287d648eec17163d3f
-
SHA1
8ed85dfd683be2919a1b612d1d924720d962d0a0
-
SHA256
abc1fb687fc4e65f2b791923cb76dab88067c0e1e115cdf97b41a97ee3e5a8b0
-
SHA512
f83957775fd9a2f840d0e50d8ca36c92209a6cf989adfca866b043281f05825de5bb0079c535d346e6aa2e629772bdd45148ef02b81026bac97e6248271888f1
-
SSDEEP
6144:5NENowLmN7JVb3hwwDX+l5F7l1k5u8vk3U4pT+PhrWHoS:5RvNdV7rDX+zF7lquQaYh6HoS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2868 RemoteAbc.exe -
resource yara_rule behavioral1/memory/2012-0-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/files/0x000c000000012267-3.dat upx behavioral1/memory/2868-4-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/2012-15-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/1108-14-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/files/0x000c000000012267-6.dat upx behavioral1/memory/2868-17-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 1108 2868 RemoteAbc.exe 31 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\system32R_Server\RemoteAbc.exe 0857f2c8541dba287d648eec17163d3f.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2868 wrote to memory of 1108 2868 RemoteAbc.exe 31 PID 2012 wrote to memory of 2792 2012 0857f2c8541dba287d648eec17163d3f.exe 29 PID 2012 wrote to memory of 2792 2012 0857f2c8541dba287d648eec17163d3f.exe 29 PID 2012 wrote to memory of 2792 2012 0857f2c8541dba287d648eec17163d3f.exe 29 PID 2012 wrote to memory of 2792 2012 0857f2c8541dba287d648eec17163d3f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0857f2c8541dba287d648eec17163d3f.exe"C:\Users\Admin\AppData\Local\Temp\0857f2c8541dba287d648eec17163d3f.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\649635.bat2⤵
- Deletes itself
PID:2792
-
-
C:\Program Files (x86)\system32R_Server\RemoteAbc.exe"C:\Program Files (x86)\system32R_Server\RemoteAbc.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 734712⤵PID:1108
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD50857f2c8541dba287d648eec17163d3f
SHA18ed85dfd683be2919a1b612d1d924720d962d0a0
SHA256abc1fb687fc4e65f2b791923cb76dab88067c0e1e115cdf97b41a97ee3e5a8b0
SHA512f83957775fd9a2f840d0e50d8ca36c92209a6cf989adfca866b043281f05825de5bb0079c535d346e6aa2e629772bdd45148ef02b81026bac97e6248271888f1
-
Filesize
231KB
MD5985ceaea838a88ecc884794362e915c5
SHA1f283c1050b4127c4c9d1bab76567ca6942fad160
SHA256ee5d7d9bb03ac254a46b0e439d2ae103a8a523e419f57b7ae23982ac3d766eaf
SHA51291db01c3ab0ddb49805614e423fba0517b7ce2c28534ca279b0120eebd0904dcfacc3dc1744499ccad98e366330baaa71d86c0c52679e3862b5485f8ff05b315
-
Filesize
190B
MD5de1dd20d65a9e191d091186ea14610e0
SHA1a25e86664e228a1ed7ae0407251657c0ff47c470
SHA2561bb0aa6203e5313a68afb17dce845e7ed4e7ff1d49c6dce54f78cdfad69baf2e
SHA512b5be57b89ffe23bde89f087eac738ad3e017df73a0d470238ee23f635efd13eea42302bb74387d58484ad6fe45aef6bf1433d41c40dc565972a10013aac5ffb0