Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 11:35
Behavioral task
behavioral1
Sample
17477af95b7b4ec2958102691a5677d3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17477af95b7b4ec2958102691a5677d3.exe
Resource
win10v2004-20231215-en
General
-
Target
17477af95b7b4ec2958102691a5677d3.exe
-
Size
10KB
-
MD5
17477af95b7b4ec2958102691a5677d3
-
SHA1
441ee1a2c83a027d7bc2f5b8b0a9d45edb1e27e6
-
SHA256
ea1bbd44c46577fde3ceff3e4892c8a4c06c2bc0c2e0f9f14b9ca97e9f9ef6ea
-
SHA512
da672161fdec1617d4d64e5ee15acf798244da8a5cbb4bc92ea4a8175d6407bf59d2a696afd27ded0deee16c19175c1e5e51a928f8980fcc0e1b259a5e1b84c7
-
SSDEEP
192:bIGRQruTIWTez+CIrav6PilUf2nrOO/yFIi3buJccg:5RQru0WKiCIrCNlUfCT/yFDu/g
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2468 rmbsonyk.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 17477af95b7b4ec2958102691a5677d3.exe 2848 17477af95b7b4ec2958102691a5677d3.exe -
resource yara_rule behavioral1/memory/2848-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000d0000000122b8-3.dat upx behavioral1/memory/2848-4-0x0000000000230000-0x000000000023E000-memory.dmp upx behavioral1/memory/2848-11-0x0000000000230000-0x000000000023E000-memory.dmp upx behavioral1/memory/2468-12-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2848-13-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rmbsony.dll 17477af95b7b4ec2958102691a5677d3.exe File created C:\Windows\SysWOW64\rmbsonyk.exe 17477af95b7b4ec2958102691a5677d3.exe File opened for modification C:\Windows\SysWOW64\rmbsonyk.exe 17477af95b7b4ec2958102691a5677d3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2468 2848 17477af95b7b4ec2958102691a5677d3.exe 28 PID 2848 wrote to memory of 2468 2848 17477af95b7b4ec2958102691a5677d3.exe 28 PID 2848 wrote to memory of 2468 2848 17477af95b7b4ec2958102691a5677d3.exe 28 PID 2848 wrote to memory of 2468 2848 17477af95b7b4ec2958102691a5677d3.exe 28 PID 2848 wrote to memory of 2932 2848 17477af95b7b4ec2958102691a5677d3.exe 29 PID 2848 wrote to memory of 2932 2848 17477af95b7b4ec2958102691a5677d3.exe 29 PID 2848 wrote to memory of 2932 2848 17477af95b7b4ec2958102691a5677d3.exe 29 PID 2848 wrote to memory of 2932 2848 17477af95b7b4ec2958102691a5677d3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17477af95b7b4ec2958102691a5677d3.exe"C:\Users\Admin\AppData\Local\Temp\17477af95b7b4ec2958102691a5677d3.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rmbsonyk.exeC:\Windows\system32\rmbsonyk.exe ˜‰2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\17477af95b7b4ec2958102691a5677d3.exe.bat2⤵
- Deletes itself
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD51b43c0b73e5d7eead70bb8fa47254901
SHA1ca3a897cb91f64d473da61577bc661ec15642f31
SHA2562e7404d66a6f1950451bf5949be1f1cd3e72adb38bf1f0527575139d438bb23f
SHA51296a91bde518fd0a9c985d0e01ee82b26e4d59d24ea77c6e9df6600ebe30ddbce6b3d19158ae3a683fe2dd4407887410bc83d9fe119e18c825a05864e398549fd
-
Filesize
10KB
MD517477af95b7b4ec2958102691a5677d3
SHA1441ee1a2c83a027d7bc2f5b8b0a9d45edb1e27e6
SHA256ea1bbd44c46577fde3ceff3e4892c8a4c06c2bc0c2e0f9f14b9ca97e9f9ef6ea
SHA512da672161fdec1617d4d64e5ee15acf798244da8a5cbb4bc92ea4a8175d6407bf59d2a696afd27ded0deee16c19175c1e5e51a928f8980fcc0e1b259a5e1b84c7