Analysis
-
max time kernel
15s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:34
Behavioral task
behavioral1
Sample
112ff066b5319b525b2a4d90a636a513.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
112ff066b5319b525b2a4d90a636a513.exe
Resource
win10v2004-20231215-en
General
-
Target
112ff066b5319b525b2a4d90a636a513.exe
-
Size
13KB
-
MD5
112ff066b5319b525b2a4d90a636a513
-
SHA1
9a4fa11c8cd6644209303a6712f01c802a8fcdca
-
SHA256
c69456fed0c554dd1086d060dd4d9ba78f6f1c277fdc33a6dd45708d1ca1b2e3
-
SHA512
a440cdfaaf6668dcb0d435b7ac6e940ad317866115d1274972677cefb61ec357d477748d4385edc31fe7ec745f11c8879906160f29008fa14bc9c0d590a641cb
-
SSDEEP
192:j4Rew/Pw5+7Gb8IdKR6UdbHdACY+P8nbzZ1MPC+/os0aGFYigLMPGRzz7o/Os6G:E9gRbZYMAHtEbjnWzL1zz72F
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4008 welyczk.exe -
resource yara_rule behavioral2/memory/4780-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x000200000001fafe-5.dat upx behavioral2/memory/4008-7-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4780-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\welycz.dll 112ff066b5319b525b2a4d90a636a513.exe File created C:\Windows\SysWOW64\welyczk.exe 112ff066b5319b525b2a4d90a636a513.exe File opened for modification C:\Windows\SysWOW64\welyczk.exe 112ff066b5319b525b2a4d90a636a513.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4008 4780 112ff066b5319b525b2a4d90a636a513.exe 19 PID 4780 wrote to memory of 4008 4780 112ff066b5319b525b2a4d90a636a513.exe 19 PID 4780 wrote to memory of 4008 4780 112ff066b5319b525b2a4d90a636a513.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\112ff066b5319b525b2a4d90a636a513.exe"C:\Users\Admin\AppData\Local\Temp\112ff066b5319b525b2a4d90a636a513.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\welyczk.exeC:\Windows\system32\welyczk.exe ˜‰2⤵
- Executes dropped EXE
PID:4008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\112ff066b5319b525b2a4d90a636a513.exe.bat2⤵PID:4444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD57338709651bfcf1e1838748ffe515be3
SHA1ab45b4f8f17c797c348b0309c3090317b1590328
SHA256f77277a71c228789f6832148baec6dd1aa1a9919f298027fce4b601a911d327c
SHA512bcb3b3bb89df6dbe20ef079a5644fad03db92c1974b74d1e83e7259a09484062a7ebb57e98ffbc1098c3adf9fa3e36a1d00fee3d272697013a45efc361e5816a
-
Filesize
13KB
MD5112ff066b5319b525b2a4d90a636a513
SHA19a4fa11c8cd6644209303a6712f01c802a8fcdca
SHA256c69456fed0c554dd1086d060dd4d9ba78f6f1c277fdc33a6dd45708d1ca1b2e3
SHA512a440cdfaaf6668dcb0d435b7ac6e940ad317866115d1274972677cefb61ec357d477748d4385edc31fe7ec745f11c8879906160f29008fa14bc9c0d590a641cb