Analysis
-
max time kernel
169s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:29
Behavioral task
behavioral1
Sample
0cfacc1a5f0b4823da0c8977faa2e9e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cfacc1a5f0b4823da0c8977faa2e9e2.exe
Resource
win10v2004-20231215-en
General
-
Target
0cfacc1a5f0b4823da0c8977faa2e9e2.exe
-
Size
13KB
-
MD5
0cfacc1a5f0b4823da0c8977faa2e9e2
-
SHA1
132b60f4c5ae83e7598cb7df94254b72f3c6b001
-
SHA256
0c7ba0ec1fb87d57323ad374f3fdf7ff8628b4965952481e76beef7d4b8d9b4f
-
SHA512
e7bb585f078e892b4761772da26d65c17992daf7c178ee1e3bb5cbdad7eee9ce2ceaa3751bc797db60e3c604f4fd020cea1328bb72e236115df6b24abe68bff0
-
SSDEEP
384:d/Bz3WYceWdiJHsIljdMEuw4Lo8Sb2e59eC/7:dISfxdjuw4LWyS/
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 3716 woodkenk.exe -
resource yara_rule behavioral2/memory/4488-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4488-3-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000200000001e7e3-5.dat upx behavioral2/memory/3716-8-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\woodkenk.exe 0cfacc1a5f0b4823da0c8977faa2e9e2.exe File opened for modification C:\Windows\SysWOW64\woodkenk.exe 0cfacc1a5f0b4823da0c8977faa2e9e2.exe File created C:\Windows\SysWOW64\woodken.dll 0cfacc1a5f0b4823da0c8977faa2e9e2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4488 wrote to memory of 3716 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 93 PID 4488 wrote to memory of 3716 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 93 PID 4488 wrote to memory of 3716 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 93 PID 4488 wrote to memory of 5072 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 98 PID 4488 wrote to memory of 5072 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 98 PID 4488 wrote to memory of 5072 4488 0cfacc1a5f0b4823da0c8977faa2e9e2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfacc1a5f0b4823da0c8977faa2e9e2.exe"C:\Users\Admin\AppData\Local\Temp\0cfacc1a5f0b4823da0c8977faa2e9e2.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\woodkenk.exeC:\Windows\system32\woodkenk.exe ˜‰2⤵
- Executes dropped EXE
PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\0cfacc1a5f0b4823da0c8977faa2e9e2.exe.bat2⤵PID:5072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD52f0748fa5b0d7776f625d6178aecb13b
SHA126febdc8bec621cbf9fcdede548c0c1b5cafecef
SHA256b4749a6c185b6e61210a535f246cba45dfe8a60b896f218c42e2d928562137dd
SHA5128f48b811d5d5edf6101979499e0188397857152a2009ece58e7057c5ccc5ec115c9fe49a97e2766fc1dafcc6de1b29cbbe0fcc4ec3f33588d985a796da37b019
-
Filesize
13KB
MD50cfacc1a5f0b4823da0c8977faa2e9e2
SHA1132b60f4c5ae83e7598cb7df94254b72f3c6b001
SHA2560c7ba0ec1fb87d57323ad374f3fdf7ff8628b4965952481e76beef7d4b8d9b4f
SHA512e7bb585f078e892b4761772da26d65c17992daf7c178ee1e3bb5cbdad7eee9ce2ceaa3751bc797db60e3c604f4fd020cea1328bb72e236115df6b24abe68bff0