Analysis
-
max time kernel
3s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
2d5b7281531e01f2e4b686c821908c17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d5b7281531e01f2e4b686c821908c17.exe
Resource
win10v2004-20231222-en
General
-
Target
2d5b7281531e01f2e4b686c821908c17.exe
-
Size
484KB
-
MD5
2d5b7281531e01f2e4b686c821908c17
-
SHA1
ab6a0c19e09ddb8e8eae4f30170c0ab7abc2e8bf
-
SHA256
81549da4d4f5f26a7bd974b5269af840868d0659b52eb76fc4bd1ed681d90067
-
SHA512
4422e9e5bce02f2fc63d1db2ff1cd6baddeb604fea9819118337aeb47e1fa1ba820384a8d4fc4422ba63da0da98afa4a162147b719e8327932f6dcdcc5e4d5f7
-
SSDEEP
12288:GoUld/f2I9JECdYW4/e4Pii15XZSAmKjlafbdDNUQ:Q92ILECd0R15XZS3QafpDNUQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2316 LB9c4j3K.exe -
resource yara_rule behavioral2/memory/1832-53-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1832-52-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1832-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1832-47-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
pid Process 4968 tasklist.exe 4860 tasklist.exe 1172 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2316 LB9c4j3K.exe 2316 LB9c4j3K.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 404 2d5b7281531e01f2e4b686c821908c17.exe 2316 LB9c4j3K.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 2316 404 2d5b7281531e01f2e4b686c821908c17.exe 27 PID 404 wrote to memory of 2316 404 2d5b7281531e01f2e4b686c821908c17.exe 27 PID 404 wrote to memory of 2316 404 2d5b7281531e01f2e4b686c821908c17.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d5b7281531e01f2e4b686c821908c17.exe"C:\Users\Admin\AppData\Local\Temp\2d5b7281531e01f2e4b686c821908c17.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\LB9c4j3K.exeC:\Users\Admin\LB9c4j3K.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del LB9c4j3K.exe3⤵PID:4564
-
-
C:\Users\Admin\xoixuec.exe"C:\Users\Admin\xoixuec.exe"3⤵PID:4952
-
-
-
C:\Users\Admin\bshost.exeC:\Users\Admin\bshost.exe2⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2532
-
-
-
C:\Users\Admin\aahost.exeC:\Users\Admin\aahost.exe2⤵PID:4468
-
-
C:\Users\Admin\dyhost.exeC:\Users\Admin\dyhost.exe2⤵PID:2196
-
-
C:\Users\Admin\ekhost.exeC:\Users\Admin\ekhost.exe2⤵PID:2160
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ekhost.exe3⤵PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 2d5b7281531e01f2e4b686c821908c17.exe2⤵PID:32
-
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:4968
-
C:\Users\Admin\aahost.exe"C:\Users\Admin\aahost.exe"1⤵PID:1832
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:4860
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5fa948ab70a2db68adcbdef897963086f
SHA1dcf362a0dd52585ddae925f079a4152e04912c0e
SHA2566407386d0c4f079d1d6063d9f43041232d80bf4a6689681479d2fd31c384797a
SHA512dded6c2fb2ddbef9c0a13cb8c0550a3a0ae986bc69a1f9ac33046fc8cdabc0e8aa9e2f0ce41715d32fe07dd0a68ff8dc470417e9fdcc2ef2f4665bf4857511be