Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 01:18
Behavioral task
behavioral1
Sample
22baaded305e8bd5679c56d33170b916.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
22baaded305e8bd5679c56d33170b916.exe
Resource
win10v2004-20231222-en
General
-
Target
22baaded305e8bd5679c56d33170b916.exe
-
Size
13KB
-
MD5
22baaded305e8bd5679c56d33170b916
-
SHA1
8cb0198a9d6811bfb0da9f27cce732c9feb6926c
-
SHA256
2b9c9eda02200260a70596db1e7352674fb3ab129eae1ba5d759607e77e874cc
-
SHA512
6d1c4af30aab32ffa1d36a553d7353aa053c70e6a9439a0a21f175bc8b0f90fa26a38f1e8c64bade5b4d77a6c4025d63d6815aa32081b6ad83eae0fbecf8001a
-
SSDEEP
384:l8GxlgO6AEJjz/y6of1jxfYNbhjLwFP1CwHG:l8GxlgOcFz/UxKbJyH
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2280 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 craoek.exe -
Loads dropped DLL 2 IoCs
pid Process 2960 22baaded305e8bd5679c56d33170b916.exe 2960 22baaded305e8bd5679c56d33170b916.exe -
resource yara_rule behavioral1/memory/2960-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000a000000015c52-3.dat upx behavioral1/memory/2960-4-0x0000000000230000-0x0000000000240000-memory.dmp upx behavioral1/memory/2620-12-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2960-13-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\craoe.dll 22baaded305e8bd5679c56d33170b916.exe File created C:\Windows\SysWOW64\craoek.exe 22baaded305e8bd5679c56d33170b916.exe File opened for modification C:\Windows\SysWOW64\craoek.exe 22baaded305e8bd5679c56d33170b916.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2620 2960 22baaded305e8bd5679c56d33170b916.exe 28 PID 2960 wrote to memory of 2620 2960 22baaded305e8bd5679c56d33170b916.exe 28 PID 2960 wrote to memory of 2620 2960 22baaded305e8bd5679c56d33170b916.exe 28 PID 2960 wrote to memory of 2620 2960 22baaded305e8bd5679c56d33170b916.exe 28 PID 2960 wrote to memory of 2280 2960 22baaded305e8bd5679c56d33170b916.exe 29 PID 2960 wrote to memory of 2280 2960 22baaded305e8bd5679c56d33170b916.exe 29 PID 2960 wrote to memory of 2280 2960 22baaded305e8bd5679c56d33170b916.exe 29 PID 2960 wrote to memory of 2280 2960 22baaded305e8bd5679c56d33170b916.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\22baaded305e8bd5679c56d33170b916.exe"C:\Users\Admin\AppData\Local\Temp\22baaded305e8bd5679c56d33170b916.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\craoek.exeC:\Windows\system32\craoek.exe ˜‰2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\22baaded305e8bd5679c56d33170b916.exe.bat2⤵
- Deletes itself
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5a0fcfe1bfc383f0dd79d7d8ede7ddb14
SHA1499c161f078a0973e9cfe9bfc15ba797a477a6c7
SHA2567330f78f9c0b6a29e226e641bc93f46cc939874e1e5890ee1be2d506a11f046f
SHA5123139dfb1b3e8e4c194c6527fed0a275d7df1aa1794e39e2366b088ee3c6eefb35770aeb3e88f8f65ff51a140aba15e31d13d841902b04c8b0f2e97ee32dc5bd5
-
Filesize
13KB
MD522baaded305e8bd5679c56d33170b916
SHA18cb0198a9d6811bfb0da9f27cce732c9feb6926c
SHA2562b9c9eda02200260a70596db1e7352674fb3ab129eae1ba5d759607e77e874cc
SHA5126d1c4af30aab32ffa1d36a553d7353aa053c70e6a9439a0a21f175bc8b0f90fa26a38f1e8c64bade5b4d77a6c4025d63d6815aa32081b6ad83eae0fbecf8001a