Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:43
Behavioral task
behavioral1
Sample
18e52ac1749ec4af2282cc4e0d137915.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18e52ac1749ec4af2282cc4e0d137915.exe
Resource
win10v2004-20231215-en
General
-
Target
18e52ac1749ec4af2282cc4e0d137915.exe
-
Size
12KB
-
MD5
18e52ac1749ec4af2282cc4e0d137915
-
SHA1
5b87394afe3d72de26cd7e04f9396745006766df
-
SHA256
0879a3ed8c782482a41fb2e2af8fd2de5708ebdbadb153a69307c48e5052dbf8
-
SHA512
80ef2e08753cad3e709fa3986b16ce58b10f7563c3fa4185ef652e61a4ed5ee205f041dbbe660243dece4a43395e724641a2bf0eb87dcc103fa4d7bce3e98b68
-
SSDEEP
192:ROn5Hvx9kUYCh3ZF5Lrrl4aSm0d8etJ4arw7Y0wkm6rcgx6OsmjoNL92CsanbIQy:c5Hvx9kUlh3ZF5Lr2axWiJcgx6OsmjJP
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 512 fliecodsk.exe -
resource yara_rule behavioral2/memory/3832-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/512-7-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/3832-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\fliecods.dll 18e52ac1749ec4af2282cc4e0d137915.exe File created C:\Windows\SysWOW64\fliecodsk.exe 18e52ac1749ec4af2282cc4e0d137915.exe File opened for modification C:\Windows\SysWOW64\fliecodsk.exe 18e52ac1749ec4af2282cc4e0d137915.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3832 wrote to memory of 512 3832 18e52ac1749ec4af2282cc4e0d137915.exe 20 PID 3832 wrote to memory of 512 3832 18e52ac1749ec4af2282cc4e0d137915.exe 20 PID 3832 wrote to memory of 512 3832 18e52ac1749ec4af2282cc4e0d137915.exe 20 PID 3832 wrote to memory of 628 3832 18e52ac1749ec4af2282cc4e0d137915.exe 104 PID 3832 wrote to memory of 628 3832 18e52ac1749ec4af2282cc4e0d137915.exe 104 PID 3832 wrote to memory of 628 3832 18e52ac1749ec4af2282cc4e0d137915.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\18e52ac1749ec4af2282cc4e0d137915.exe"C:\Users\Admin\AppData\Local\Temp\18e52ac1749ec4af2282cc4e0d137915.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\fliecodsk.exeC:\Windows\system32\fliecodsk.exe ˜‰2⤵
- Executes dropped EXE
PID:512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\18e52ac1749ec4af2282cc4e0d137915.exe.bat2⤵PID:628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD53d0b6c6556e67e18ed0b6c33c346e764
SHA13d85d6d3eb1a539a690286326366781730b9be62
SHA2560216ff72a6ce51bc5d1e0ae28e68bf4fad833f954ff8a015c76101e953ea0e2e
SHA5122667268de0549014179f8a24568cc9426eaa153de5a539ee9c39fbc0fe8ec453cf2eeb3c6017d70dc5e1f220ef8a6ef7903cd9ef2570bb0259bc73d58e413139