Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:25
Behavioral task
behavioral1
Sample
19f084883a390aa27bdac77e03018827.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19f084883a390aa27bdac77e03018827.exe
Resource
win10v2004-20231215-en
General
-
Target
19f084883a390aa27bdac77e03018827.exe
-
Size
12KB
-
MD5
19f084883a390aa27bdac77e03018827
-
SHA1
016c607fa7fa1d17a127a383d9d0b2695789311f
-
SHA256
c24db7e10b51b36943fe33aa902a90a92b8f364ecd519a5139808dffd73d5b21
-
SHA512
8daddd6bc6228a8af265da7a227cd71d9c13c64e7171afa34e07cb2a5da51caba707f174bc334b5c7549870496e8701ea5884ff9d60d5ce434f706f8cb47eab5
-
SSDEEP
192:1Pu75a3XxbeWIHqP8SEXY/ifwGNNZlnuIpveWuPEHABFWo7Slqukb:1Pu75a3h6WIHqP8lZlnJveWkEgzWzq/
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 4408 cupopsk.exe -
resource yara_rule behavioral2/memory/3324-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x00070000000231f7-4.dat upx behavioral2/memory/3324-6-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4408-7-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\cupopsk.exe 19f084883a390aa27bdac77e03018827.exe File created C:\Windows\SysWOW64\cupops.dll 19f084883a390aa27bdac77e03018827.exe File created C:\Windows\SysWOW64\cupopsk.exe 19f084883a390aa27bdac77e03018827.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4408 3324 19f084883a390aa27bdac77e03018827.exe 91 PID 3324 wrote to memory of 4408 3324 19f084883a390aa27bdac77e03018827.exe 91 PID 3324 wrote to memory of 4408 3324 19f084883a390aa27bdac77e03018827.exe 91 PID 3324 wrote to memory of 3456 3324 19f084883a390aa27bdac77e03018827.exe 100 PID 3324 wrote to memory of 3456 3324 19f084883a390aa27bdac77e03018827.exe 100 PID 3324 wrote to memory of 3456 3324 19f084883a390aa27bdac77e03018827.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\19f084883a390aa27bdac77e03018827.exe"C:\Users\Admin\AppData\Local\Temp\19f084883a390aa27bdac77e03018827.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cupopsk.exeC:\Windows\system32\cupopsk.exe ˜‰2⤵
- Executes dropped EXE
PID:4408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\19f084883a390aa27bdac77e03018827.exe.bat2⤵PID:3456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD50d16d4f4704ab55cda5e4da4599748d9
SHA196f4af455c9815a950d016b0130bc6eacc68a430
SHA2560aeb3e1c253d0c0ddfff54bb2c1c0d0391451ebf729da88d2b6f19f1226b800d
SHA5127564961573872096b5dcd9a85732869e1424c275a96be66907a295a75852baca2782ad85f5eb7b3dc5a06af7398ff0a12ca8c01ec83e5135d1c3510eae0478e4
-
Filesize
12KB
MD519f084883a390aa27bdac77e03018827
SHA1016c607fa7fa1d17a127a383d9d0b2695789311f
SHA256c24db7e10b51b36943fe33aa902a90a92b8f364ecd519a5139808dffd73d5b21
SHA5128daddd6bc6228a8af265da7a227cd71d9c13c64e7171afa34e07cb2a5da51caba707f174bc334b5c7549870496e8701ea5884ff9d60d5ce434f706f8cb47eab5