Analysis
-
max time kernel
3s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
12ce865f30cf09fb1695d51e65f4a3b4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
12ce865f30cf09fb1695d51e65f4a3b4.exe
Resource
win10v2004-20231215-en
General
-
Target
12ce865f30cf09fb1695d51e65f4a3b4.exe
-
Size
460KB
-
MD5
12ce865f30cf09fb1695d51e65f4a3b4
-
SHA1
582b66806b08e0b02bf4fc4dd4dfdca200c7cc20
-
SHA256
3d5f832d20a62ba11f9c5cad7202bdd16e711f13ddb95f37654bf0eb01c300b6
-
SHA512
5d7a64cb3a0f6cec3603f84d9ce645a3de9eb80bc4de2a8974fcabc8593ba03fa370fd47f15af097e35061eb33ee214b10ca3fa69412080f71392066983a32ca
-
SSDEEP
12288:WlSt6oIHNOhU5O5TYo4XqTig5GSR9CClDDL:WlSt69HNx6T/5xT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2864 iBdqphzke5.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe -
resource yara_rule behavioral1/memory/2560-53-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2560-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2560-51-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2560-47-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2560-43-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2560-41-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2496 2560 WerFault.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2576 tasklist.exe 2356 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2864 iBdqphzke5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 2864 iBdqphzke5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2864 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 21 PID 3040 wrote to memory of 2864 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 21 PID 3040 wrote to memory of 2864 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 21 PID 3040 wrote to memory of 2864 3040 12ce865f30cf09fb1695d51e65f4a3b4.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ce865f30cf09fb1695d51e65f4a3b4.exe"C:\Users\Admin\AppData\Local\Temp\12ce865f30cf09fb1695d51e65f4a3b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\iBdqphzke5.exeC:\Users\Admin\iBdqphzke5.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iBdqphzke5.exe3⤵PID:2644
-
-
C:\Users\Admin\teilo.exe"C:\Users\Admin\teilo.exe"3⤵PID:800
-
-
-
C:\Users\Admin\dstat.exeC:\Users\Admin\dstat.exe2⤵PID:2372
-
-
C:\Users\Admin\astat.exeC:\Users\Admin\astat.exe2⤵PID:2668
-
-
C:\Users\Admin\fstat.exeC:\Users\Admin\fstat.exe2⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 12ce865f30cf09fb1695d51e65f4a3b4.exe2⤵PID:1812
-
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 881⤵
- Program crash
PID:2496
-
C:\Users\Admin\astat.exe"C:\Users\Admin\astat.exe"1⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:1856
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5a4cdb62cf4866a17e742e7e9cc73d237
SHA130d94f8e872455ac569949ac4c768d0a0cdfbba7
SHA256c741d649bf5b72fbe97470820ce994ce29b153baae14af10c3a2a9adc3098b32
SHA512c4447f95565d3e5dc0ef7712382325280bedf127ac682f85f4043b586afb4188633f2c73277595eb31fe45d992107492f42c82a71f448286a9cb8fac4bfb3671
-
Filesize
92KB
MD5897baeb2a4c8b1423697bd24caaa1f2c
SHA1c84f1c46d35126781fd1b39e3d0abae18a7a80c0
SHA256e51e784a6bd2bc356fc852239f2e8e500f064daea5f4da509c2fbfb8c68ea790
SHA512daf3e842dcf507b7d1d422c181247345ed8460c8569baf5c6f5f4cd32f769ce1057b0380e826ebcbf793c3461020f68c86670fb2154d21e4ddb10b184172fd90