Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
1b3d14682e796ed7749469e8e2003ccc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b3d14682e796ed7749469e8e2003ccc.exe
Resource
win10v2004-20231215-en
General
-
Target
1b3d14682e796ed7749469e8e2003ccc.exe
-
Size
27KB
-
MD5
1b3d14682e796ed7749469e8e2003ccc
-
SHA1
4b4ca1cf7796a2d59c7ebfed2d34eba107576e99
-
SHA256
cb6f0350e4ae46ba4f9037648406ba7a6066e0eb3097286bbd78e5ee27eb71b4
-
SHA512
b133d6918eb3180915dea5a0e9ddf03250b993863ee0baced5545432c54b877b2e37f975b517857d36c3ef98333cf5cfca4f18b722df53d500892b3971dcc9ac
-
SSDEEP
384:Rjk/A6WET7A5tRIoTS/DdJjjXNHN1doc0lZoEbtxb1JZoZs2daBl1bQg1k:Rjk/A6WYBD3XvQcq9xHqZjk/k
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 NTdhcp.exe -
Loads dropped DLL 2 IoCs
pid Process 2428 1b3d14682e796ed7749469e8e2003ccc.exe 2428 1b3d14682e796ed7749469e8e2003ccc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdhcp.exe 1b3d14682e796ed7749469e8e2003ccc.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe 1b3d14682e796ed7749469e8e2003ccc.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe NTdhcp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat 1b3d14682e796ed7749469e8e2003ccc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2728 2428 1b3d14682e796ed7749469e8e2003ccc.exe 16 PID 2428 wrote to memory of 2728 2428 1b3d14682e796ed7749469e8e2003ccc.exe 16 PID 2428 wrote to memory of 2728 2428 1b3d14682e796ed7749469e8e2003ccc.exe 16 PID 2428 wrote to memory of 2728 2428 1b3d14682e796ed7749469e8e2003ccc.exe 16 PID 2428 wrote to memory of 2712 2428 1b3d14682e796ed7749469e8e2003ccc.exe 15 PID 2428 wrote to memory of 2712 2428 1b3d14682e796ed7749469e8e2003ccc.exe 15 PID 2428 wrote to memory of 2712 2428 1b3d14682e796ed7749469e8e2003ccc.exe 15 PID 2428 wrote to memory of 2712 2428 1b3d14682e796ed7749469e8e2003ccc.exe 15
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat1⤵
- Deletes itself
PID:2712
-
C:\Windows\SysWOW64\NTdhcp.exeC:\Windows\system32\NTdhcp.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\1b3d14682e796ed7749469e8e2003ccc.exe"C:\Users\Admin\AppData\Local\Temp\1b3d14682e796ed7749469e8e2003ccc.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2428
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD51b3d14682e796ed7749469e8e2003ccc
SHA14b4ca1cf7796a2d59c7ebfed2d34eba107576e99
SHA256cb6f0350e4ae46ba4f9037648406ba7a6066e0eb3097286bbd78e5ee27eb71b4
SHA512b133d6918eb3180915dea5a0e9ddf03250b993863ee0baced5545432c54b877b2e37f975b517857d36c3ef98333cf5cfca4f18b722df53d500892b3971dcc9ac