Analysis
-
max time kernel
1s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
26553c8b9b9a411e028d8da9eedc9c8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
26553c8b9b9a411e028d8da9eedc9c8c.exe
Resource
win10v2004-20231222-en
General
-
Target
26553c8b9b9a411e028d8da9eedc9c8c.exe
-
Size
13.4MB
-
MD5
26553c8b9b9a411e028d8da9eedc9c8c
-
SHA1
722e18e5c050b69af80d711beca3d26e15c40f44
-
SHA256
ad5e51d953b7b93040aef1df73080d0fb8148514c76a28489f35f4af3e86220a
-
SHA512
66f1069bbceba4a56603d02a82dfd9be56fee4d79b93e6223c8f42bd6d30f5d88e83c594ed89ba296c7190de9a84f64186d86c3ff98da901d4bdaf9fed3ab1f5
-
SSDEEP
393216:FpAzXLKi/KForUnnXFwtAdPUqJyBTIm1GQvn:FpAfnlAnXFBdPU4yT1GQvn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1244 InstallTools.exe 3476 bytefence-installer-5.5.0.7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231f5-6.dat nsis_installer_1 behavioral2/files/0x00070000000231f5-6.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1244 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 29 PID 1900 wrote to memory of 1244 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 29 PID 1900 wrote to memory of 1244 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 29 PID 1900 wrote to memory of 3476 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 30 PID 1900 wrote to memory of 3476 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 30 PID 1900 wrote to memory of 3476 1900 26553c8b9b9a411e028d8da9eedc9c8c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\26553c8b9b9a411e028d8da9eedc9c8c.exe"C:\Users\Admin\AppData\Local\Temp\26553c8b9b9a411e028d8da9eedc9c8c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\InstallTools.exe"C:\Users\Admin\AppData\Local\Temp\InstallTools.exe" "C:\Users\Admin\AppData\Local\Temp\26553c8b9b9a411e028d8da9eedc9c8c.exe" Software\ByteFence INSNDE "C:\Users\Admin\AppData\Local\Temp\26553c8b9b9a411e028d8da9eedc9c8c.exe" /mode=s /url=logs.bytefence.com/event /product=Bytefence2⤵
- Executes dropped EXE
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\bytefence-installer-5.5.0.7.exe"C:\Users\Admin\AppData\Local\Temp\bytefence-installer-5.5.0.7.exe" /LM=3 /INSTEX /cd=12345 /thankyou /IGNORE="C:\Users\Admin\AppData\Local\Temp\26553c8b9b9a411e028d8da9eedc9c8c.exe"2⤵
- Executes dropped EXE
PID:3476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e5281ee73fc928d3153126b0eda64192
SHA12e76578e99f09fafb4eb1b3cc5e417bb421bf6e0
SHA256e6413c1163a3cbb2819d20abd86e58b1d57c4b0a3568861ac68a1ac8f5e6b06f
SHA512795907219e41e57e99b6c92ab71f6b5c9c2d4c0f1cc7b6dd2fcaf3e657606a1ea6f7c0ba0d9491dc958bbf88de679adbed9681bcb48f4ab4ae7e7d327eea1270