Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
18c80795556210709794f01e31a62fda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18c80795556210709794f01e31a62fda.exe
Resource
win10v2004-20231215-en
General
-
Target
18c80795556210709794f01e31a62fda.exe
-
Size
40KB
-
MD5
18c80795556210709794f01e31a62fda
-
SHA1
b11e9f4b89005e7e371321d6702c29aaef2df6db
-
SHA256
81fb5da67f3921503d60efa61118688c7dc695f41852d0b1f616d1c7ee4d8627
-
SHA512
0cf300dffa9b64b8feeb9cc78b622f85cf290ff7ed0448258c1687e5deed17ae644d8d384bcdde51e1f992fa7763d20743e91355d653c93bc73cde9f7aeb57cb
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtH2FJM1P:aqk/Zdic/qjh8w19JDHaM1P
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2524 services.exe -
resource yara_rule behavioral1/files/0x000d000000012321-9.dat upx behavioral1/memory/2524-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2508-4-0x00000000001B0000-0x00000000001B8000-memory.dmp upx behavioral1/memory/2524-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-22-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-29-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-46-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-47-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-51-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2524-76-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 18c80795556210709794f01e31a62fda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 18c80795556210709794f01e31a62fda.exe File opened for modification C:\Windows\java.exe 18c80795556210709794f01e31a62fda.exe File created C:\Windows\java.exe 18c80795556210709794f01e31a62fda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2524 2508 18c80795556210709794f01e31a62fda.exe 28 PID 2508 wrote to memory of 2524 2508 18c80795556210709794f01e31a62fda.exe 28 PID 2508 wrote to memory of 2524 2508 18c80795556210709794f01e31a62fda.exe 28 PID 2508 wrote to memory of 2524 2508 18c80795556210709794f01e31a62fda.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c80795556210709794f01e31a62fda.exe"C:\Users\Admin\AppData\Local\Temp\18c80795556210709794f01e31a62fda.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5e8a3ece22f3ee9e532949d890e571457
SHA1e0966e2264bb1507d21cd71f63556b888e711be8
SHA25619164babd170a12363627ad6dab1a7139e163ef9bbaf5febd629683b498881ec
SHA512f0c9184ea28a71c374ba198862d817355f702f9089876b763de39f8decb7bbcad3715b8bfa81971d0b6ad49ef0076327709f6d37ec1a1647a2edd6bc90e71ba6
-
Filesize
1KB
MD57ce3fbb4fbadd896feb242fa7b1dab33
SHA10cc6f93a5b21d25e9bf1e65c29b2fcb99b8ae975
SHA256422e9be7c9c4b4d030319b2cc8a58677ae2b8af965e56dc696870ceeedc141c8
SHA512176f3ddae1a922d27e47da01b14f5be34cda5749755c23a67dcc7204f7b04e209062da5747946111d499c67a14d04dff6b44d9a8ab110f3d835cd7fa6c986477
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2