Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 05:05
Behavioral task
behavioral1
Sample
295035f97f883939e55881990d525b40.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
295035f97f883939e55881990d525b40.exe
Resource
win10v2004-20231215-en
General
-
Target
295035f97f883939e55881990d525b40.exe
-
Size
13KB
-
MD5
295035f97f883939e55881990d525b40
-
SHA1
7f365a65170d8b93d43d264be0f2dba7ce2ebb47
-
SHA256
4b14b62f1fba0c925ae135f2f5f8047104b1dbbf2cb3378759bb0287ad0e0f40
-
SHA512
f68731390d51b40a3cfa7062df965272e5118ad17305957f83761226c76a0e7915527c3f8413947fdce0dca7ba9687082d47f0299da780d461de5c96726da7ba
-
SSDEEP
384:1rNakzT8njwB6e1VxP/piFlB30uC8pQXg:5hgnMB6eJIV30ip
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 416 sunonyk.exe -
resource yara_rule behavioral2/memory/64-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x000300000002274f-5.dat upx behavioral2/memory/64-6-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/416-7-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\sunony.dll 295035f97f883939e55881990d525b40.exe File created C:\Windows\SysWOW64\sunonyk.exe 295035f97f883939e55881990d525b40.exe File opened for modification C:\Windows\SysWOW64\sunonyk.exe 295035f97f883939e55881990d525b40.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 64 295035f97f883939e55881990d525b40.exe 64 295035f97f883939e55881990d525b40.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 64 wrote to memory of 416 64 295035f97f883939e55881990d525b40.exe 90 PID 64 wrote to memory of 416 64 295035f97f883939e55881990d525b40.exe 90 PID 64 wrote to memory of 416 64 295035f97f883939e55881990d525b40.exe 90 PID 64 wrote to memory of 1304 64 295035f97f883939e55881990d525b40.exe 98 PID 64 wrote to memory of 1304 64 295035f97f883939e55881990d525b40.exe 98 PID 64 wrote to memory of 1304 64 295035f97f883939e55881990d525b40.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe"C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\sunonyk.exeC:\Windows\system32\sunonyk.exe ˜‰2⤵
- Executes dropped EXE
PID:416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\295035f97f883939e55881990d525b40.exe.bat2⤵PID:1304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5fec4cd61023b33d73e90807c75fdaeab
SHA188c5154cb44823807e008817616fddaf3ada34ec
SHA256236ebcc5059633b7cd468f969808f32250e9364aab3ff49fa0383d558346946f
SHA512536aa6224385d8be820ed1e10ea5dd66dec0be09972048404e3150f4c58c3bed81436f553e0db1993021281c5e05871ddf0f84c8774949504258b37fd1299e46
-
Filesize
13KB
MD5295035f97f883939e55881990d525b40
SHA17f365a65170d8b93d43d264be0f2dba7ce2ebb47
SHA2564b14b62f1fba0c925ae135f2f5f8047104b1dbbf2cb3378759bb0287ad0e0f40
SHA512f68731390d51b40a3cfa7062df965272e5118ad17305957f83761226c76a0e7915527c3f8413947fdce0dca7ba9687082d47f0299da780d461de5c96726da7ba