Analysis
-
max time kernel
113s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 06:35
Behavioral task
behavioral1
Sample
1130c4bb586bd5d11ef66d185dd8edc1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1130c4bb586bd5d11ef66d185dd8edc1.exe
Resource
win10v2004-20231215-en
General
-
Target
1130c4bb586bd5d11ef66d185dd8edc1.exe
-
Size
14KB
-
MD5
1130c4bb586bd5d11ef66d185dd8edc1
-
SHA1
cf2bd11e606c19d285a2b32b8ca504c0802560b3
-
SHA256
8eaa4f17e4f3a65cde77afc15e4f1d77d04642ec9bbdedc83e00536ad12bf77d
-
SHA512
521f6b5fd2869887b0eebcc129a6358fe4d233448da26a7fefd5cd7825e86504816fbcf309a6189e0fcce2e11e36317190b10279296ad7fe384edbedc3d305af
-
SSDEEP
384:IJBse9eTnP7xChPQy3vq5C8qYK+7XwIJG7E9RvP:IJuseTnP7chrZ8Kaww39Rv
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4920 xuntxnk.exe -
resource yara_rule behavioral2/memory/4500-0-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/files/0x000900000002312b-4.dat upx behavioral2/memory/4500-8-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/4920-10-0x0000000000400000-0x0000000000411000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xuntxn.dll 1130c4bb586bd5d11ef66d185dd8edc1.exe File created C:\Windows\SysWOW64\xuntxnk.exe 1130c4bb586bd5d11ef66d185dd8edc1.exe File opened for modification C:\Windows\SysWOW64\xuntxnk.exe 1130c4bb586bd5d11ef66d185dd8edc1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4920 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 94 PID 4500 wrote to memory of 4920 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 94 PID 4500 wrote to memory of 4920 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 94 PID 4500 wrote to memory of 1504 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 97 PID 4500 wrote to memory of 1504 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 97 PID 4500 wrote to memory of 1504 4500 1130c4bb586bd5d11ef66d185dd8edc1.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1130c4bb586bd5d11ef66d185dd8edc1.exe"C:\Users\Admin\AppData\Local\Temp\1130c4bb586bd5d11ef66d185dd8edc1.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\xuntxnk.exeC:\Windows\system32\xuntxnk.exe ˜‰2⤵
- Executes dropped EXE
PID:4920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\1130c4bb586bd5d11ef66d185dd8edc1.exe.bat2⤵PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD5b0a8268016d12c17050d14d27b0e5ea9
SHA193c502abfb0d86c322006bf24fa25388064b69da
SHA25689c52386ff269b7e0992ff4adfcd039f16e40c924b56308589e12a56a2537987
SHA51209dcc4eea6302b7dd03d736bde4d87ae5a54b74f667c569c4bcdd0055a53dbd0d62024d3d3c3f4470298f58872eab3a3c1e99a197eebfbfd1177b116572bb345
-
Filesize
14KB
MD51130c4bb586bd5d11ef66d185dd8edc1
SHA1cf2bd11e606c19d285a2b32b8ca504c0802560b3
SHA2568eaa4f17e4f3a65cde77afc15e4f1d77d04642ec9bbdedc83e00536ad12bf77d
SHA512521f6b5fd2869887b0eebcc129a6358fe4d233448da26a7fefd5cd7825e86504816fbcf309a6189e0fcce2e11e36317190b10279296ad7fe384edbedc3d305af