Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:35
Behavioral task
behavioral1
Sample
124a65d16c0f48ef7b94afd838415a10.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
124a65d16c0f48ef7b94afd838415a10.exe
Resource
win10v2004-20231215-en
General
-
Target
124a65d16c0f48ef7b94afd838415a10.exe
-
Size
902KB
-
MD5
124a65d16c0f48ef7b94afd838415a10
-
SHA1
06771a4b250cff1e1ab5538fcc93855e24a6a0b5
-
SHA256
22e5cba437553f13f7404f76e2f9473ab8cedde95b8e42ef9a3f2792ec4d7f32
-
SHA512
c20a8a5a7cca0fad294c6aa4ccbe95c87b3c42ac13045d3cbfc26f3aa31bb4cc7d75978ef5d5481348e088c5373924a12dce9540376f4650c636ed5e99524ed0
-
SSDEEP
12288:rbpHYUKy5U1bo9t8DMRSW9vbciUiLuAvOxMt11i27Qitjm:r5sJo6YrFUiyAak11Ltjm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4852 svchest425075242507520.exe -
resource yara_rule behavioral2/memory/4892-0-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4892-1-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/files/0x0006000000023205-9.dat upx behavioral2/memory/4852-10-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/memory/4852-12-0x0000000000400000-0x0000000000597000-memory.dmp upx behavioral2/files/0x0006000000023205-8.dat upx behavioral2/files/0x0006000000023205-7.dat upx behavioral2/memory/4892-13-0x0000000000400000-0x0000000000597000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\124a65d16c0f48ef7b94afd838415a10.exe" 124a65d16c0f48ef7b94afd838415a10.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4892 124a65d16c0f48ef7b94afd838415a10.exe 4852 svchest425075242507520.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 124a65d16c0f48ef7b94afd838415a10.exe File opened for modification \??\c:\Windows\BJ.exe 124a65d16c0f48ef7b94afd838415a10.exe File created \??\c:\Windows\svchest425075242507520.exe 124a65d16c0f48ef7b94afd838415a10.exe File opened for modification \??\c:\Windows\svchest425075242507520.exe 124a65d16c0f48ef7b94afd838415a10.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4852 4892 124a65d16c0f48ef7b94afd838415a10.exe 90 PID 4892 wrote to memory of 4852 4892 124a65d16c0f48ef7b94afd838415a10.exe 90 PID 4892 wrote to memory of 4852 4892 124a65d16c0f48ef7b94afd838415a10.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\124a65d16c0f48ef7b94afd838415a10.exe"C:\Users\Admin\AppData\Local\Temp\124a65d16c0f48ef7b94afd838415a10.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD5099c9e6b09a6685a9eb28bf7c4b82c9e
SHA1c4e11b177b56e88824db420cda1cecca34060bf6
SHA2560762c886c87ffe9c438d1aed8787688091140f312e6a7d125ee2abf6e314e3e2
SHA512ee9d335455b8d4d71a46e961d570d45bb7ffe44cd6cb1c1f62d6c973826c6d6c2c08a89ad51f14fca1cf3be05d791bff5dbf7d4f69d461fad91116396b2aaf1d
-
Filesize
92KB
MD5caf00a50e1f5d03cdafa7e0bbde864d0
SHA1f678e1645b4b69a1d7853709338aec13b00f784d
SHA256e8ac9f7e0dc93bc44b31a6f1c221e5d19a4e15b2e6616c3e78e1bd1c98dd4c9c
SHA51211ff5e7aed38e15bbb00fc94a00f13c4a7d6db088d7f708a7a787d981b024e77466d74b63611d6886decbc8ca9d15ddba446b3ecc38c1f7c95bae2103fb438e1
-
Filesize
137KB
MD5f6e84e5e4f4cec078561e2e458965e9e
SHA185ec72c9bddb79fe2203eac683adfdbdf590c98f
SHA2566980a29afb0605f98c78a220bf5044f825e38ad20c2316dab1907976901a3989
SHA512d006f4e1763477c170ea3058f50898da97ae9c389d9fa4d75b52bbd24aedfb72091c18103538ddd472180da4c78342f1c6ea08ebeed0183cc07f5d29b1836bbe