Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2abe7cca18dce6e2749f69846e9c489e.exe
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2abe7cca18dce6e2749f69846e9c489e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2abe7cca18dce6e2749f69846e9c489e.exe
-
Size
209KB
-
MD5
2abe7cca18dce6e2749f69846e9c489e
-
SHA1
bdcbf059df02a81e2841c08fe487b2175e0a61dc
-
SHA256
c84b5f63992b480e3684a142210ec953bf4bce56920a2f2e8bff5b77322b5447
-
SHA512
f27350c959c01b5ffa9c632720b8c88cc87c65583fd04c9a3dcbdada8afee4a582ccd2d48bf2a27be783ef0bfb6e716dd83570aa7e1f683613e70df6bf9c8919
-
SSDEEP
6144:1ldgA0AZVEJagGwtZ24vMjzJW9XOAvhTQ:dguVEJptZ2Eq0xOAp0
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2828 u.dll 2612 mpress.exe 2444 u.dll 2032 mpress.exe -
Loads dropped DLL 8 IoCs
pid Process 2940 cmd.exe 2940 cmd.exe 2828 u.dll 2828 u.dll 2940 cmd.exe 2940 cmd.exe 2444 u.dll 2444 u.dll -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2940 2724 2abe7cca18dce6e2749f69846e9c489e.exe 21 PID 2724 wrote to memory of 2940 2724 2abe7cca18dce6e2749f69846e9c489e.exe 21 PID 2724 wrote to memory of 2940 2724 2abe7cca18dce6e2749f69846e9c489e.exe 21 PID 2724 wrote to memory of 2940 2724 2abe7cca18dce6e2749f69846e9c489e.exe 21 PID 2940 wrote to memory of 2828 2940 cmd.exe 20 PID 2940 wrote to memory of 2828 2940 cmd.exe 20 PID 2940 wrote to memory of 2828 2940 cmd.exe 20 PID 2940 wrote to memory of 2828 2940 cmd.exe 20 PID 2828 wrote to memory of 2612 2828 u.dll 19 PID 2828 wrote to memory of 2612 2828 u.dll 19 PID 2828 wrote to memory of 2612 2828 u.dll 19 PID 2828 wrote to memory of 2612 2828 u.dll 19 PID 2940 wrote to memory of 2444 2940 cmd.exe 18 PID 2940 wrote to memory of 2444 2940 cmd.exe 18 PID 2940 wrote to memory of 2444 2940 cmd.exe 18 PID 2940 wrote to memory of 2444 2940 cmd.exe 18 PID 2444 wrote to memory of 2032 2444 u.dll 17 PID 2444 wrote to memory of 2032 2444 u.dll 17 PID 2444 wrote to memory of 2032 2444 u.dll 17 PID 2444 wrote to memory of 2032 2444 u.dll 17 PID 2940 wrote to memory of 2388 2940 cmd.exe 16 PID 2940 wrote to memory of 2388 2940 cmd.exe 16 PID 2940 wrote to memory of 2388 2940 cmd.exe 16 PID 2940 wrote to memory of 2388 2940 cmd.exe 16
Processes
-
C:\Windows\SysWOW64\calc.exeCALC.EXE1⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\F4C.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\F4C.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exeF4D.tmp"1⤵
- Executes dropped EXE
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save ose00000.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444
-
C:\Users\Admin\AppData\Local\Temp\E72.tmp\mpress.exe"C:\Users\Admin\AppData\Local\Temp\E72.tmp\mpress.exe" "C:\Users\Admin\AppData\Local\Temp\exeE73.tmp"1⤵
- Executes dropped EXE
PID:2612
-
C:\Users\Admin\AppData\Local\Temp\u.dllu.dll -bat vir.bat -save 2abe7cca18dce6e2749f69846e9c489e.exe.com -include s.dll -overwrite -nodelete1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\E43.tmp\vir.bat""1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2abe7cca18dce6e2749f69846e9c489e.exe"C:\Users\Admin\AppData\Local\Temp\2abe7cca18dce6e2749f69846e9c489e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724