Analysis
-
max time kernel
126s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:29
Behavioral task
behavioral1
Sample
266aedca0746a9606080c1b35371bc0e.exe
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
266aedca0746a9606080c1b35371bc0e.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
266aedca0746a9606080c1b35371bc0e.exe
-
Size
14KB
-
MD5
266aedca0746a9606080c1b35371bc0e
-
SHA1
386b838975dee3a385747b8b9def7ffaf3818c35
-
SHA256
86211d3380f3c57727fbd0598b519e73bca251977cb4730188d282bf57f2b8dd
-
SHA512
a311d92d7159cc6b0689bffcd5bc75dc061980225fd145ccb71e063ed610a3779b17034d8cf03311f4f47d297ef3711ec3191613b9141a442a1b87a95f150228
-
SSDEEP
384:/PJkTWwGy1PZsxPCStZx42ymDJ8QZ+2P6vGDB:/P1wt1PZsxHZhymun
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2980-2-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral1/memory/2980-24-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1916 2980 266aedca0746a9606080c1b35371bc0e.exe 17 PID 2980 wrote to memory of 1916 2980 266aedca0746a9606080c1b35371bc0e.exe 17 PID 2980 wrote to memory of 1916 2980 266aedca0746a9606080c1b35371bc0e.exe 17 PID 2980 wrote to memory of 1916 2980 266aedca0746a9606080c1b35371bc0e.exe 17 PID 1916 wrote to memory of 2372 1916 cmd.exe 16 PID 1916 wrote to memory of 2372 1916 cmd.exe 16 PID 1916 wrote to memory of 2372 1916 cmd.exe 16 PID 1916 wrote to memory of 2372 1916 cmd.exe 16 PID 2980 wrote to memory of 1960 2980 266aedca0746a9606080c1b35371bc0e.exe 34 PID 2980 wrote to memory of 1960 2980 266aedca0746a9606080c1b35371bc0e.exe 34 PID 2980 wrote to memory of 1960 2980 266aedca0746a9606080c1b35371bc0e.exe 34 PID 2980 wrote to memory of 1960 2980 266aedca0746a9606080c1b35371bc0e.exe 34 PID 1960 wrote to memory of 384 1960 cmd.exe 37 PID 1960 wrote to memory of 384 1960 cmd.exe 37 PID 1960 wrote to memory of 384 1960 cmd.exe 37 PID 1960 wrote to memory of 384 1960 cmd.exe 37 PID 2980 wrote to memory of 308 2980 266aedca0746a9606080c1b35371bc0e.exe 36 PID 2980 wrote to memory of 308 2980 266aedca0746a9606080c1b35371bc0e.exe 36 PID 2980 wrote to memory of 308 2980 266aedca0746a9606080c1b35371bc0e.exe 36 PID 2980 wrote to memory of 308 2980 266aedca0746a9606080c1b35371bc0e.exe 36 PID 308 wrote to memory of 1784 308 cmd.exe 35 PID 308 wrote to memory of 1784 308 cmd.exe 35 PID 308 wrote to memory of 1784 308 cmd.exe 35 PID 308 wrote to memory of 1784 308 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e.exe"C:\Users\Admin\AppData\Local\Temp\266aedca0746a9606080c1b35371bc0e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c echo olha > C:\Users\Admin\AppData\Local\Temp\blomaisatualmentee.txt2⤵
- Suspicious use of WriteProcessMemory
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\letsplay1 msnmsgsr.exe3⤵PID:384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe2⤵
- Suspicious use of WriteProcessMemory
PID:308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\jumperr.exe /nogui C:\systemX86.txt2⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Windows\System32\msnmsgsr.exe2⤵PID:2132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"2⤵PID:1096
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c echo olha1⤵PID:2372
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ren C:\Windows\System32\letsplay2 jumperr.exe1⤵PID:1784
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v MsnMsgr /t REG_SZ /d "C:\Windows\system32\msnmsgsr.exe"1⤵PID:2840